Home | Amazing | Today | Tags | Publishers | Years | Search 
Heterogeneous Cellular Networks
Heterogeneous Cellular Networks

A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks

The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE...

Handbook of Graphs and Networks
Handbook of Graphs and Networks

Complex interacting networks are observed in systems from such diverse areas as physics, biology, economics, ecology, and computer science. For example, economic or social interactions often organize themselves in complex network structures. Similar phenomena are observed in traffic flow and in communication networks as the internet. In...

Search Analytics for Your Site
Search Analytics for Your Site

Any organization that has a searchable web site or intranet is sitting on top of hugely valuable and usually under-exploited data: logs that capture what users are searching for, how often each query was searched, and how many results each query retrieved. Search queries are gold: they are real data that show us exactly what users are...

Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide

[Note: This Second Edition is also available in Kindle format!]

Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast - no more finger pointing because the packets never lie! From "Death by
...

Search Engine Optimization All-in-One For Dummies (For Dummies (Business & Personal Finance))
Search Engine Optimization All-in-One For Dummies (For Dummies (Business & Personal Finance))

Since the late 1990s, Internet marketing has taken off as a dynamic marketing channel because of its accuracy and how easily you can track traffic. The Internet has come a long way in a short time: As it grew, finding the sites you were looking for with a directory became impossible. Search engines appeared as the way forward, offering a way...

Jump Start Node.js
Jump Start Node.js
One of the difficulties I had when trying to learn Node.js was how to get started. The references that I found either dealed with quasi-academic topics such as datagrams and event emitters, or else myopically focused on a topic without regard for the big picture. This book takes you through the complete process of...
How to Build a Successful Blog Business
How to Build a Successful Blog Business

How to Build a Successful Blog Business is a straight forward guide to building a publishing business online that covers everything from choosing a niche to hiring staff, registering a business to selling it, finding traffic to monetizing it. Whether you are interested in creating an additional income stream or building a fully-fledged...

Managing Now
Managing Now
Information technology is a familiar aspect of our lives. We use computers, e-mail, software, cell phones, iPods, fax machines, flash drives, scanners, and BlackBerry®-type devices every day. We search for travel information on Expedia, download airline tickets from AA.com, and register for and take college courses online....
Microsoft Dynamics AX 2012 Security How-To
Microsoft Dynamics AX 2012 Security How-To

Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

WordPress Mobile Web Development: Beginner's Guide
WordPress Mobile Web Development: Beginner's Guide

The chances are that more of your WordPress website visitors are using mobiles, or more clients are demanding responsive or mobile sites. If you can use WordPress to build mobile-friendly sites you can win more business from clients and more traffic for your site.

"WordPress Mobile Web Development Beginner's Guide"...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy