Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
EDGE for Mobile Internet
EDGE for Mobile Internet
This ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become...
Serious Performance Consulting According to Rummler
Serious Performance Consulting According to Rummler

Praise for Serious Performance Consulting According to Rummler

"Before there was 'lean,' before there was TQM, before there was knowledge management, and before there were any one-minute cures, there was Geary Rummler preaching and practicing performance technology. With Serious...

Rare Event Simulation using Monte Carlo Methods
Rare Event Simulation using Monte Carlo Methods
In a probabilistic model, a rare event is an event with a very small probability of occurrence. The forecasting of rare events is a formidable task but is important in many areas. For instance a catastrophic failure in a transport system or in a nuclear power plant, the failure of an information processing system in a bank, or in the communication...
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Introduction to Random Signals and Noise
Introduction to Random Signals and Noise

Random signals and noise are present in many engineering systems and networks. Signal processing techniques allow engineers to distinguish between useful signals in audio, video or communication equipment, and interference, which disturbs the desired signal.

With a strong mathematical grounding, this text...

Communications Satellites: Global Change Agents (Telecommunications Series)
Communications Satellites: Global Change Agents (Telecommunications Series)

Over the past 40 years, satellites have played a key role in creating a global culture, spreading worldwide entertainment, stimulating technological interchange, and promoting trade around the world. Communications Satellites: Global Change Agents addresses communications satellites not only in terms of the technology and the services...

Great Events From History: The 20th Century, 1941-1970
Great Events From History: The 20th Century, 1941-1970

This is a unique resource: Nothing is comparable with this much depth or numbers that covers so many 20th century events.??AAGreat Events from History: The Twentieth Century, 1941-1970??AA, is the ninth installment in Salem Press' ongoing ??AAGreat Events from History??AA series. This six-volume set contains 1,112 essays on more than 1,100...

Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Understanding Wap : Wireless Applications, Devices, and Services (Artech House Telecommunications Library)
Understanding Wap : Wireless Applications, Devices, and Services (Artech House Telecommunications Library)
Over the last five years or so a revolution has taken place, and continues to do so, that is changing the way we communicate and interact with each other and our environment. The advent of the Internet and the ubiquitous presence of mobile personal communications systems are the most prominent examples of this. The Internet has made it possible to...
Systems Approach to Engineering Design (Artech House Telecommunications Library)
Systems Approach to Engineering Design (Artech House Telecommunications Library)
This comprehensive resource shows how to incorporate systems thinking & systems engineering techniques into every stage of the design process from concept inception, testing, & quality assurance, to implementation, delivery, & upgrading

As high-tech engineering organizations learn to do more with less, they
...
Cisco IOS XR Fundamentals
Cisco IOS XR Fundamentals

Over the last several years, fiscal discipline has really dominated the industry. Both consumers and businesses expect far more from their communications providers than they did just a few years ago. Offering simple telephone dial tone and an Internet connection are not going to be enough for success. At the same time, however, service providers...

Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy