Home | Amazing | Today | Tags | Publishers | Years | Search 
Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless and Ad Hoc Networks
Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless and Ad Hoc Networks

Algorithmic discrete mathematics plays a key role in the development of information and communication technologies, and methods that arise in computer science, mathematics and operations research – in particular in algorithms, computational complexity, distributed computing and optimization – are vital to modern services such as...

Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

Mobile IPv6: Protocols and Implementation
Mobile IPv6: Protocols and Implementation

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.). 

This book covers the IPv6 host mobility protocol known as "mobile IPv6"...

Professional Ubuntu Mobile Development (Wrox Programmer to Programmer)
Professional Ubuntu Mobile Development (Wrox Programmer to Programmer)

Ubuntu Mobile is quickly being adopted by mobile device manufacturers and provides Web browsing, e-mail, media, camera, VoIP, instant messaging, GPS, blogging, digital TV, games, contacts, dates/calendar, and simple software updates on every mobile device. As the first book on Ubuntu Mobile, this resource is authored by one of the top experts...

Hacking For Dummies
Hacking For Dummies

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!

It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that...

WiMAX Security and Quality of Service: An End-to-End Perspective
WiMAX Security and Quality of Service: An End-to-End Perspective

WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and...

Beginning Ubuntu Linux, Fifth Edition
Beginning Ubuntu Linux, Fifth Edition

Ubuntu Linux is the fastest growing Linux-based operating system, and Beginning Ubuntu Linux, Fifth Edition teaches all of us—including those who have never used Linux—how to use it productively, whether you come from Windows or the Mac or the world of open source.

Beginning Ubuntu Linux, Fifth Edition...

Computer Networks ISE: A Systems Approach
Computer Networks ISE: A Systems Approach

I what has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergenceof voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid security...

How to Do Everything MacBook
How to Do Everything MacBook

Easy-to-follow coverage of portable Macs, including the MacBook, MacBook Pro, and MacBook Air

How to Do Everything: MacBook strongly emphasizes the portability and other unique features of the laptop versions of the Mac, examining ports and jacks, discussing user accounts and privacy, managing multiple network connections,...

Openfire Administration: A practical step-by-step guide to rolling out a secure Instant Messaging service over your network
Openfire Administration: A practical step-by-step guide to rolling out a secure Instant Messaging service over your network

Openfire is a free, open-source and full featured Jabber-based Instant Messaging server.

This book is a guide to setting up Openfire, tweaking it, and customizing it to build a secure and feature-rich alternative to consumer IM networks. The features covered include details about setting up the server, adding and handling users and...

Microsoft Office Communications Server 2007 R2 Resource Kit
Microsoft Office Communications Server 2007 R2 Resource Kit

In-depth, comprehensive, and fully revised for R2—this RESOURCE KIT delivers the information you need to deploy, manage, and troubleshoot Microsoft Office Communications Server 2007 R2. Get technical insights, scenarios, and best practices from those who know the technology best—the engineers who designed and developed...

Microsoft Dynamics CRM 4 Integration Unleashed
Microsoft Dynamics CRM 4 Integration Unleashed

In Microsoft® Dynamics CRM 4 Integration Unleashed, two leading experts present proven techniques, best practices, and example code for going far beyond the out-of-the-box capabilities of Dynamics CRM 4. Using these solutions and sample applications, you will enhance all of...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy