 |
|
 DWDM Network Designs and Engineering SolutionsA comprehensive book on DWDM network design and implementation solutions
Design Software Included
* Study various optical communication principles as well as communication methodologies in an optical fiber * Design and evaluate optical components in a DWDM network * Learn about the effects of noise in signal...
|  |  Hacking for DummiesFind out if your system is vulnerable to hack attacks!
"The coverage of security topics in this book can help you avoid a hack attack." — Stuart McClure
"To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat... |  |  More About High-volume Web Sites (IBM Redbooks)In 1999, Dr Willy Chiu, noticing the emergence of many large and complex customer Web sites, and observing how they often failed to deliver the expected robustness and customer satisfaction, set up a new team within IBM called the High-Volume Web Sites (HVWS) team. This team was chartered to work with customers and IBM internal teams involved in... |
|
 Professional Visual Studio 2005Visual Studio 2005 is an enormous product. Incorporating the latest advances in both Visual Basic® and C# as well as improvements and new features in the user interface, it can be daunting without the kind of guidance this book provides.
In these pages you'll learn to harness every feature of this remarkable development... |  |  Encyclopedia of Urban LegendsAny folklorist who saw the 1998 Columbia Pictures film Urban Legend will probably remember the library scene for its depiction of one aspect of folklore research. In this scene the beautiful student Natalie (played by Alicia Witt) suspects that recent campus mayhem was inspired by urban legends, the same kind of stories... |  |  Uncertainty and Information: Foundations of Generalized Information TheoryDeal with information and uncertainty properly and efficiently using tools emerging from generalized information theory
Uncertainty and Information: Foundations of Generalized Information Theory contains comprehensive and up-to-date coverage of results that have emerged from a research program begun by the author in the early 1990s under the... |
|
|
 Eclipse in Action: A Guide for the Java Developer"The technical information is dead on...I'd definitely recommend this book to anyone."
This book is a fast-paced but thorough guide to the effective use of Eclipse's features and plugins for real-world Java development. Interesting examples demonstrate how to use Eclipse to build, test, and debug applications using... |  |  Data Mining: Opportunities and ChallengesAn overview of the multidisciplinary field of data mining, this book focuses specifically on new methodologies and case studies. Included are case studies written by 44 leading scientists and talented young scholars from seven different countries. Topics covered include data mining based on rough sets, the impact of missing data, and mining free... |  |  Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... |
|
Result Page: 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 |