 |
|
|
 Map-based Mobile Services: Theories, Methods and ImplementationsThe book is divided into three parts: theory, method and implementation. Starting with a summary of the state-of-the-art in mobile technologies, the first part analyses their impacts on cartography and pinpoints the missing theories concerned with the development of map-based mobile services. A conceptual framework of mobile cartography is then... |  |  CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.
Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused... |  |  Multi-Objective Optimization in Computer Networks Using MetaheuristicsMany new multicast applications emerging from the Internet, such as Voice-over-IP (VoIP), videoconference, TV over the Internet, radio over the Internet, video streaming multipoint, etc., have the following resource requirements: bandwidth consumption, end-to-end delay, delay jitter, packet loss ratio, and so forth. It is therefore necessary to... |
|
 Mastering Microsoft Windows Vista Home: Premium and BasicIn-depth Coverage of Windows Vista Home Premium—Including Coverage of Vista Home Basic
Configure, run, and troubleshoot Windows Vista Home Premium or Windows Vista Home Basic with the detailed coverage you'll find in this comprehensive guide. With a task-based approach and clear, no-nonsense instructions,... |  |  Designing with Web Standards (2nd Edition)Best-selling author, designer, and web standards evangelist Jeffrey Zeldman has updated his classic, industry-shaking guidebook. This new edition--now in full color--covers improvements in best practices and advances in the world of browsers since the first edition introduced the world to standards-based design. Written in the same engaging and... |  |  Active and Programmable Networks for Adaptive Architectures and ServicesNew applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... |
|
|
Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 |