Home | Amazing | Today | Tags | Publishers | Years | Search 
Ubiquitous Multimedia Computing
Ubiquitous Multimedia Computing

Computing is ubiquitous and if you think otherwise, that in itself might be the best evidence that it is so. Computers are omnipresent in modern life and the multimedia computing environment of today is becoming more and more seamless.

Bringing together contributions from dozens of leading experts, Ubiquitous Multimedia...

Design, Measurement and Management of Large-Scale IP Networks: Bridging the Gap Between Theory and Practice
Design, Measurement and Management of Large-Scale IP Networks: Bridging the Gap Between Theory and Practice
Designing efficient Internet Protocol (IP) networks and maintaining them effectively poses a range of challenges, but in this highly competitive industry it is crucial that these are overcome. Weaving together theory and practice, this title sets out the design and management principles of large-scale IP networks, and the need for tasks to be...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld

During his campaign for reelection in 1996, the Internet-savvy President Bill Clinton used the slogan “Building a Bridge to the 21st Century.” It turns out that the bridge is operated and maintained in cyber form, and that malevolent actors can practice their black arts to disrupt or destroy the bridge, its cyber traffic, and all...

The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
Performance and scalability are more critical than ever in today’s enterprise database applications, and traditional database tuning isn’t nearly enough to solve the performance problems you are likely to see in those applications. Nowadays, 75-95% of the time it takes to process a data request is typically spent in the database...
My New Iphone: 52 Simple Projects to Get You Started
My New Iphone: 52 Simple Projects to Get You Started

You finally did it-you bought the gizmo that everyone's talking about. Maybe you've already figured out how to play music or make phone calls, but then what?

How does the voicemail work? And that keyboard? What about all of those cool apps-which ones do you need, and how do you get them? You need a book like My New iPhone...

Mudras: Yoga in Your Hands
Mudras: Yoga in Your Hands

Mudras also playfully called the "finger power points" are yoga positions for your hands and fingers. They can be practiced sitting, lying down, standing, or walking. They can be done at any time and place while stuck in traffic, at the office, watching TV, or whenever you have to twiddle your thumbs waiting for something. Hirschi...

Psychology and Religion : An Introduction
Psychology and Religion : An Introduction

This is a rather unusual book on the psychology of religion. As usual I try my very best to set down what is empirically true in the light of what is now extensive evidence on this subject. But I also take a sympathetic view of religion—I have faith in both enterprises, psychology and religion, and believe that in the end they can be...

Deploying Cisco Wide Area Application Services (2nd Edition)
Deploying Cisco Wide Area Application Services (2nd Edition)

Implement advanced WAN optimization, application acceleration, and branch virtualization with Cisco WAAS 4.1

 

This book brings together all the information you need to design and deploy scalable, transparent application acceleration, WAN optimization, and branch...

Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)
Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

Authorized Self-Study Guide

Implementing Cisco IOS Network Security (IINS)

 

Foundation learning for CCNA Security IINS 640-553 exam

 

...

Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Twitter Marketing For Dummies
Twitter Marketing For Dummies

An introductory guide to effectively using Twitter to grow your business!

The field of social media marketing is exciting, cutting-edge, and...open to almost anything! Twitter's style of quick remarks lends itself to a carefree, conversational tone, ripe for passing along a plug, sharing a suggestion, or referencing a...

The Design of Plastic Optical Systems (SPIE Tutorial Text Vol. TT80)
The Design of Plastic Optical Systems (SPIE Tutorial Text Vol. TT80)

Many items we use in our daily lives-the traffic signals, motion sensors, fingerprint readers, cell phone cameras, bar code scanners, and DVD players-rely upon plastic optical systems to perform. Consequently, there is a growing need for individuals who are knowledgeable in the design, development, and production of such systems.

...

Result Page: 52 51 50 49 48 47 46 45 44 43 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy