Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How Computers Work (How It Works Series)
How Computers Work (How It Works Series)
How Computers Work is the premier four-color guide to PCs. Using hundreds of pages of detailed, color drawings, How Computers Work, not only tells, but shows readers everything from how a signal travels through a circuit to why your game c -With more than 600,000 copies sold, How Computers Work is the classic graphic reference with four color...
Oracle PL/SQL Built-ins Pocket Reference
Oracle PL/SQL Built-ins Pocket Reference
This pocket reference provides quick-reference information that will help you use Oracle Corporation's extensive set of built-in functions and packages, including those new to Oracle8.

Oracle's PL/SQL language is a programming language providing procedural extensions to the SQL relational database language and to an ever-growing number of...

Introduction to Wireless Local Loop (Artech House Telecommunications Library)
Introduction to Wireless Local Loop (Artech House Telecommunications Library)
Here's a comprehensive, easy-to-understand guide to the underlying technologies, key selection criteria, and design and deployment processes behind wireless local loop (WLL) systems. This one-source reference helps technical professionals develop a sound understanding of WLL system design procedures, and provides practical guidance on choosing the...
Software Project Management: A Unified Framework
Software Project Management: A Unified Framework

Presents new management framework uniquely suited to the complexities of modern software development. Exposes the shortcoming of many wellaccepted management priorities & equips software professionals with state-of-the-art knowledge derived from the authors 20 years successful experience with project management. DLC: Computer software -...

Privacy on the Line: The Politics of Wiretapping and Encryption
Privacy on the Line: The Politics of Wiretapping and Encryption
In the spring of 1993, the White House announced an unprecedented plan for both promoting and
controlling the use of secret codes to keep communications private. The plan, formally called key
escrow but popularly known as "Clipper" after its star component, the Clipper chip, was to adopt a
new federal standard for
...
From Workplace to Workspace: Using E-mail Lists to Work Together
From Workplace to Workspace: Using E-mail Lists to Work Together
From a desktop, e-mail provides a quick, reliable and cost-effective link to the world at large, changing a traditional workplace into a workspace that crosses even international boundaries. In developing areas of the world such as Africa, Asia and Latin America, e-mail lists are currently outgrowing all other Internet-based technologies because of...
Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms
Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms
Many real-time systems rely on static scheduling algorithms. This includes cyclic scheduling, rate monotonic scheduling and fixed schedules created by off-line scheduling techniques such as dynamic programming, heuristic search, and simulated annealing. However, for many real-time systems, static scheduling algorithms are quite restrictive and...
  
   
Result Page: Previous 27 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy