Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Those not already deeply immersed in recondite Kennedy assassination lore will find this offering by Kroth-an associate professor of counseling psychology at Santa Clara University, and a contributor to CounterPunch, a biweekly "muckraking newsletter"-well over the top. Advertised as an "objective" look at the myriad conspiracy...
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
The Perfect Reference for the Multitasked System Administrators
The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing
...
Encyclopedia of Mobile Computing and Commerce
Encyclopedia of Mobile Computing and Commerce
Nowadays, mobile communication, mobile devices, and mobile computing are widely available. Everywhere people are carrying mobile devices, such as mobile phones. The availability of mobile communication networks has made a huge impact to various applications, including commerce. Consequently, there is a strong relationship between mobile computing...
Desktop Encyclopedia of Voice and Data in Networking
Desktop Encyclopedia of Voice and Data in Networking

The telecommunications industry is changing rapidly in its quest to converge voice and data on high-performance multiservice networks that are designed to meet virtually any business and consumer need. These nextgeneration networks are being driven as much by the revenue-generating potential of new integrated applications as they are by the...

Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach

This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment

Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book...

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Android Wireless Application Development (2nd Edition) (Developer's Library)
Android Wireless Application Development (2nd Edition) (Developer's Library)

Android™ Wireless Application Development  Second Edition

 

Lauren Darcey

Shane Conder

 

The start-to-finish guide to Android application...

Understanding Telephone Electronics, Fourth Edition (Newnes)
Understanding Telephone Electronics, Fourth Edition (Newnes)
Covers conventional telephone fundamentals! Explores how telephone systems operate and how digital electronics replace them. "Introduces state-of-the-art speech circuits, dialing, ringing, and central office electronics. Dissects modems and digital transmission techniques. Studies microcomputers and cellular phones. Helps readers increase...
High Performance Datacenter Networks: Architectures, Algorithms, & Opportunities (Synthesis Lectures on Computer Architecture)
High Performance Datacenter Networks: Architectures, Algorithms, & Opportunities (Synthesis Lectures on Computer Architecture)

Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by an array of applications ranging from communication intensive climatology, complex material...

Lean UX: Applying Lean Principles to Improve User Experience
Lean UX: Applying Lean Principles to Improve User Experience

The Lean UX approach to interaction design is tailor-made for today’s web-driven reality. In this insightful book, leading advocate Jeff Gothelf teaches you valuable Lean UX principles, tactics, and techniques from the ground up—how to rapidly experiment with design ideas, validate them with real users, and continually...

Real World Windows 8 App Development with JavaScript: Create Great Windows Store Apps (Expert's Voice in Windows 8)
Real World Windows 8 App Development with JavaScript: Create Great Windows Store Apps (Expert's Voice in Windows 8)

Real World Windows 8 App Development with JavaScript offers you practical advice and hard-earned insights that will help you create and publish apps to a worldwide market.

Led by authors with deep Windows 8 app development experience, you’ll learn how to make the most of Microsoft’s APIs for hooking into...

unlimited object storage image
Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy