Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java and XSLT (O'Reilly Java)
Java and XSLT (O'Reilly Java)
Java and Extensible Stylesheet Language Transformations (XSLT) are very different
technologies that complement one another, rather than compete. Java's strengths are portability,
its vast collection of standard libraries, and widespread acceptance by most companies. One
weakness of Java, however, is in its ability to process text.
...
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

In these days of shortened fiscal horizons and contracted time-to-market schedules, traditional approaches to capacity planning are often seen by management as tending to inflate their production schedules. Rather than giving up in the face of this kind of relentless pressure to get things done faster, Guerrilla Capacity Planning facilitates...

Integrated Circuit Design for High-Speed Frequency Synthesis (Artech House Microwave Library)
Integrated Circuit Design for High-Speed Frequency Synthesis (Artech House Microwave Library)
Frequency synthesizers are used in everything from wireless and wireline communications to waveform generation, but until now circuit design expertise in this area has been scattered in numerous trade publications and papers. This one-stop resource gives circuit designers all the straight-from-the-lab techniques, procedures, and applications they...
Video Over IP, Second Edition: IPTV, Internet Video, H.264, P2P, Web TV, and Streaming: A Complete Guide to Understanding the Technology
Video Over IP, Second Edition: IPTV, Internet Video, H.264, P2P, Web TV, and Streaming: A Complete Guide to Understanding the Technology
"I find this book among the better ones, for its systematic approach and clarity of the text...The "Video over IP" book is highly recommended for all practising broadcast engineers."- EBU Techincal Review

?...here is a guide that gives you everything you need to know to find the best solution for your application.? ?
...
Cabling Handbook, The (2nd Edition)
Cabling Handbook, The (2nd Edition)

The Cabling Handbook, Second Edition is a thorough, up-to-the-minute professional's guide to every aspect of LAN and telecommunications cabling, from planning through installation and management. From Category 5 twisted pair and fiber to the latest wireless LAN solutions, it's all here:...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Epidemics and Rumours in Complex Networks (London Mathematical Society Lecture Note Series)
Epidemics and Rumours in Complex Networks (London Mathematical Society Lecture Note Series)

Information propagation through peer-to-peer systems, online social systems, wireless mobile ad hoc networks and other modern structures can be modelled as an epidemic on a network of contacts. Understanding how epidemic processes interact with network topology allows us to predict ultimate course, understand phase transitions and develop...

Sensor Technology Handbook
Sensor Technology Handbook
The first decade of the 21st century has been labeled by some as the “Sensor Decade.”
With a dramatic increase in sensor R&D and applications over the past 15 years, sensors
are certainly poised on the brink of a revolution similar to that experienced in
microcomputers in the 1980s. Just in automobiles alone, sensing
...
Integrated Frequency Synthesizers for Wireless Systems
Integrated Frequency Synthesizers for Wireless Systems
The increasingly demanding performance requirements of communications systems, as well as problems posed by the continued scaling of silicon technology, present numerous challenges for the design of frequency synthesizers in modern transceivers. This book contains everything you need to know for the efficient design of frequency synthesizers for...
An Invitation to Computer Science, 5th Edition
An Invitation to Computer Science, 5th Edition

This text is intended for a one-semester introductory course in computer science. It presents a breadth-first overview of the discipline that assumes no prior background in computer science, programming, or mathematics. It is appropriate for use in a service course for students not majoring in computer science. It is also appropriate...

Wireless Communications (Wiley - IEEE)
Wireless Communications (Wiley - IEEE)

"Professor Andreas F. Molisch, renowned researcher and educator, has put together the comprehensive book, Wireless Communications. The second edition, which includes a wealth of new material on important topics, ensures the role of the text as the key resource for every student, researcher, and practitioner in the...

unlimited object storage image
Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy