Home | Amazing | Today | Tags | Publishers | Years | Search 
Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
*A practical engineer’s reference that puts the key information at your fingertips
*Covers essential data, techniques and working practice
*This update covers the latest international regulations

Newnes Data Communications Pocket Book is a remarkable toolkit for engineers, IT professionals, managers and students. The wide
...
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

Intelligent Image Processing
Intelligent Image Processing
Intelligent Image Processing describes the EyeTap technology that allows non-invasive tapping into the human eye through devices built into eyeglass frames. This isn't merely about a computer screen inside eyeglasses, but rather the ability to have a shared telepathic experience among viewers. Written by the developer of the EyeTap principle, this...
Microsoft SQL Server 2000 DTS
Microsoft SQL Server 2000 DTS
Microsoft SQL Server 2000 Data Transformation Services covers all facets in the development of data transformations with DTS. The reader will learn how to create each of the DTS tasks, both in the User Interface supplied with SQL Server and through the object model using Visual Basic or VBScript.

Microsoft SQL Server 2000 Data Transformation...

The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
What Top Managers Really Need to Know about Information Technology

"These kinds of productivity principles are not mere theory. When we put these same principles into effect, our productivity went up more than we had thought possible. And our employee morale went up, too. It became easier to write code the right way and harder to make...

Negative Refraction Metamaterials: Fundamental Principles and Applications
Negative Refraction Metamaterials: Fundamental Principles and Applications
Learn about the revolutionary new technology of negative-refraction metamaterials

Negative-Refraction Metamaterials: Fundamental Principles and Applications introduces artificial materials that support the unusual electromagnetic property of negative refraction. Readers will discover several classes of negative-refraction materials along with...

Wireless Technology: Applications, Management, and Security (Lecture Notes in Electrical Engineering)
Wireless Technology: Applications, Management, and Security (Lecture Notes in Electrical Engineering)
This is an edited volume based on selected papers from the annual Wireless Telecommunications Symposium. The WTS is a forum to exchange information on advances in mobile communications and wireless networking technology, management, applications, and security in a conference environment with leaders and experts from industry, governmental agencies,...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Information theory lies at the heart of modern technology, underpinning all communications, networking, and data storage systems. This book sets out, for the first time, a complete overview of both classical and quantum information theory. Throughout, the reader is introduced to key results without becoming lost in mathematical details. Opening...
Second Life For Dummies (Computer/Tech)
Second Life For Dummies (Computer/Tech)
You’ve heard all about Second Life. Maybe you’ve already jumped with both feet—and gotten stuck. Or maybe you’re a Second Life veteran who wants to build something or run a business. Fear not! Second Life For Dummies is hear to hold your hand, pat your back, and cheer you on through this new and enchanting reality....
Modular Java: Creating Flexible Applications with OSGi and Spring
Modular Java: Creating Flexible Applications with OSGi and Spring
The secret weapon for attacking complexity in any project is to break it down into smaller, cohesive, and more easily digestible pieces. With Modular Java, you can easily develop applications that are more flexible, testable, maintainable, and comprehensible.

Modular Java is a pragmatic guide to developing modular
...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy