Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Feedback Linearization of RF Power Amplifiers
Feedback Linearization of RF Power Amplifiers

Improving the performance of the power amplifier is the most pressing problem facing designers of modern radio-frequency (RF) transceivers. Linearity and power efficiency of the transmit path are of utmost importance, and the power amplifier has proven to be the bottleneck for both. High linearity enables transmission at the highest data...

Introduction to Digital Professional Mobile Radio (Artech House Mobile Communications Library)
Introduction to Digital Professional Mobile Radio (Artech House Mobile Communications Library)
Offering unique insight from the author's years of experience working with this technology, the book presents a comparison of the properties of conventional analogue and new digital PMR systems.

This practical new book is written for mobile communication professionals who are involved in the planning, design, testing,
...
Next Generation Network Services: Technologies & Strategies
Next Generation Network Services: Technologies & Strategies
'Next Generation' refers to the new technologies and services that telecommunications operators will have at their disposal as they create new 3G networks where voice and data converge and which are based on packet switched rather than circuit switched telephony.

Providing a much needed overview of the latest communication technologies
...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Business Intelligence for Telecommunications (Informa Telecoms & Media)
Business Intelligence for Telecommunications (Informa Telecoms & Media)
Bringing together market research reports, business analyst briefings, and technology references into one comprehensive volume, Business Intelligence for Telecommunications identifies those advances in both methods and technology that are being employed to inform decision-making and give companies an edge in the rapidly growing and...
Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed
Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed

This comprehensive book covers the strategy, tactics, and processes needed for successful project portfolio management. It outlines a road map to unprecedented project management improvement and includes a detailed implementation plan for both strategic planning and a PMO that gives you measurable results in weeks. The author delineates four...

Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Jump-Starting America: How Breakthrough Science Can Revive Economic Growth and the American Dream
Jump-Starting America: How Breakthrough Science Can Revive Economic Growth and the American Dream
The untold story of how America once created the most successful economy the world has ever seen and how we can do it again.

The American economy glitters on the outside, but the reality is quite different. Job opportunities and economic growth are increasingly concentrated in a few crowded coastal enclaves.
...
Data Networks, IP and the Internet: Protocols, Design and Operation
Data Networks, IP and the Internet: Protocols, Design and Operation
Modern data networks are all based on the Internet or on IP (Internet Protocol). But many people remain confused by multiprotocol networks. How do all the protocols fit together? How do I build a network? What do all the components do? What sort of problems should I expect?

Data Networks, IP and the Internet is intended not only for...

Innovation in Information Technology
Innovation in Information Technology
The health of the computer science field and related disciplines has
been an enduring concern of the National Research Council’s Computer  cience and Telecommunications Board (CSTB). From its first reports in the late 1980s, CSTB has examined the nature, conduct, scope, and directions of the research that drives innovation in
...
Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy