Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
System-Level Design Methodologies for Telecommunication
System-Level Design Methodologies for Telecommunication
Long-term evolution (LTE) indoor coverage is becoming important day by day due to multilayer design and high traffic-building premises. Nowadays, it is true that user expectations from operator’s indoor high-quality services and capacity availability provides a well-promised opportunity to offer improved LTE services with...
Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management
Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management

Explaining how to apply to mathematical programming to network design and control, Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management fills the gap between mathematical programming theory and its implementation in communication networks. From the...

Fault-Tolerant IP and MPLS Networks
Fault-Tolerant IP and MPLS Networks

In the wake of increased traffic, today's service providers and enterprises must assure high availability across a variety of networked services and applications. Multiprotocol Label Switching (MPLS) is the enabling technology for the widespread deployment of IP networks in core and Metro Ethernet applications. Many service...

PIC Basic Projects: 30 Projects using PIC BASIC and PIC BASIC PRO
PIC Basic Projects: 30 Projects using PIC BASIC and PIC BASIC PRO
Microcontrollers are single-chip computers consisting of CPU (central processing unit), data and program memory, serial and parallel I/O (input/output), timers, external and internal interrupts, all integrated into a single chip that can be purchased for as little as $2.00. Microcontrollers are intelligent electronic devices used to control and...
Culture and Conquest in Mongol Eurasia
Culture and Conquest in Mongol Eurasia
'... will occupy and entertain specialists for some time to come ...' Bulletin of the School of Oriental & African Studies

'Thomas Allsen's book is a very compact and informative account of the cultural changes which took place during the supremacy of the Mongols. Allsen is able to share with the reader his impressive knowledge of
...
Management Strategies for the Cloud Revolution
Management Strategies for the Cloud Revolution

Increase efficiency while saving money with “on-demand” computing

The biggest game-changing force in business since the creation of the Internet, cloud computing simplifies and lowers the cost of operations while providing flexibility and power you never dreamed possible. Make your strategic move now, with...

Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide

[Note: This Second Edition is also available in Kindle format!]

Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast - no more finger pointing because the packets never lie! From "Death by
...

Cisco IOS Access Lists
Cisco IOS Access Lists
Cisco IOS Access Lists takes a methodical approach to access lists and their capabilities, and is ideal for administrators of Cisco equipment who have configured access lists before but feel as if they're not taking full advantage of their capabilities (which, author Jeff Sedayao proves, extend well beyond security). Much of what Sedayao...
Internet Technologies Handbook: Optimizing the IP Network
Internet Technologies Handbook: Optimizing the IP Network
The Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -...
Planning and Design of Airports, Fifth Edition
Planning and Design of Airports, Fifth Edition

Authoritative, Up-to-Date Coverage of Airport Planning and Design

Fully updated to reflect the significant changes that have occurred in the aviation industry, the new edition of this classic text offers definitive guidance on every aspect of planning, design, engineering, and renovating airports and terminals. Planning and...

Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Advanced Distributed Systems: Third International School and Symposium, ISSADS 2004, Guadalajara, Mexico
Advanced Distributed Systems: Third International School and Symposium, ISSADS 2004, Guadalajara, Mexico
This volume contains the accepted papers from the 3rd International School
and Symposium on Advanced Distributed Systems held in Guadalajara, Mexico,
January 24–30, 2004. This event was organized by the teams made up of members
of CINVESTAV Guadalajara, CUCEI, the Computer Science Department of
the Centre of Research and
...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy