Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile and Wireless Systems Beyond 3G: Managing New Business Opportunities
Mobile and Wireless Systems Beyond 3G: Managing New Business Opportunities
With the rapid growth of the wireless mobile applications, wireless voice has
begun to challenge wireline voice, whereas the desire to access e-mail, surf the
Web or download music (e.g., MP3) wirelessly is increasing for wireless data.
While second generation (2G) cellular wireless systems, such as cdmaOne1,
GSM2 and TDMA3,
...
Blackberry Hacks
Blackberry Hacks

The BlackBerry has become an invaluable tool for those of us who need to stay connected and in the loop. But most people take advantage of only a few features that this marvelous communications device offers. What if you could do much more with your BlackBerry than just web surfing and email?

...
Administering Data Centers: Servers, Storage, and Voice over IP
Administering Data Centers: Servers, Storage, and Voice over IP
"This book covers a wide spectrum of topics relevant to implementing and managing a modern data center. The chapters are comprehensive and the flow of concepts is easy to understand."
—Cisco reviewer

Gain a practical knowledge of data center concepts

To create a well-designed data center (including storage...

Software Requirements: Encapsulation, Quality, and Reuse
Software Requirements: Encapsulation, Quality, and Reuse

Software Requirements: Encapsulation, Quality, and Reuse describes how to make requirements, and their implementing code, easier to change through the use of Freedom methodology. Freedom reduces software life cycle costs by making requirements quickly adaptable to changing technology and business needs. This book examines the definition of...

Soft Computing for Information Processing and Analysis (Studies in Fuzziness and Soft Computing)
Soft Computing for Information Processing and Analysis (Studies in Fuzziness and Soft Computing)
Search engines, with Google at the top, have become the most heavily used online service, with millions of searches performed every day and many remarkable capabilities. Soft Computing for Information Processing and Analysis includes reports from the front of soft computing in the internet industry and imparts knowledge and...
Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)
Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)

The first edition of this book, which was published in 1995, contained thirteen chapters. My objective was to produce a general textbook that treated all the essential core areas of cryptography, as well as a selection of more advanced topics. In writing the book, I tried to design it to be flexible enough to permit a wide variety of...

Project Manager: Mastering the Art of the Delivery
Project Manager: Mastering the Art of the Delivery

Learn how to be the safe pair of hands in your organisation, consistently delivering exceptional projects on time and to budget. The steep rise in demand for good project managers in recent years has been mirrored by the publication of book after book setting out the formal processes and mechanics of project management. Whether they are...

IPv6 Network Administration
IPv6 Network Administration
This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration,...
Agile Development with ICONIX Process: People, Process, and Pragmatism
Agile Development with ICONIX Process: People, Process, and Pragmatism

Many people (especially agilists) associate a high-ceremony software development process with a dead project (i.e., rigor mortis), and this association is not entirely incorrect. Our approach aims to put back the rigor while leaving out the mortis—that is, we can do rigorous analysis and design without killing the...

Wicked Cool Java : Code Bits, Open-Source Libraries, and Project Ideas
Wicked Cool Java : Code Bits, Open-Source Libraries, and Project Ideas
Wicked Cool Java contains 101 fun, interesting, and useful ways to get more out of Java. This isn't intended as a Java tutorial--it's targeted at developers and system architects who have some basic Java knowledge but may not be familiar with the wide range of libraries available. Full of example code and ideas for combining them in useful...
Windows Server 2003 Network Administration
Windows Server 2003 Network Administration

This book is the Windows Server version of the classic TCP/IP Network Administration. Like the book that inspired it, Windows Server 2003 Network Administration provides an overview of the essential TCP/IP protocols, and explains how to properly manage and...

Dynamic Enterprise Architecture: How to Make It Work
Dynamic Enterprise Architecture: How to Make It Work
This book presents an approach to enterprise architecture, which enables corporations to achieve their business objectives faster. Focusing on the governance of IT in the organization, it provides tangible tools, advice and strategies for implementing and designing the architectural process within a corporation that will make a major contribution...
unlimited object storage image
Result Page: Previous 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy