Home | Amazing | Today | Tags | Publishers | Years | Search 
The Debugger's Handbook
The Debugger's Handbook

Focused on the best practices for writing code as well as on the methods to perform more effective debugging, The Debugger's Handbook promotes a natural debugging approach to writing code. The author begins by examining and concretely defining just what a bug is, what circumstances are more prone to producing bugs, and how to avoid them from the...

Business Strategies for the Next-Generation Network (Informa Telecoms & Media)
Business Strategies for the Next-Generation Network (Informa Telecoms & Media)

Carriers and service providers have united around the concept of the Next-Generation Network (NGN). Although leveraging a broad basket of Internet technologies, the NGN is not being planned as the next-generation Internet. In its intention and architecture, it is more accurately described as Broadband-ISDN release 2.0. The NGN is hard to...

Packet Forwarding Technologies
Packet Forwarding Technologies
As Internet traffic continues to grow exponentially, there is a great need to build Internet protocol (IP) routers with high-speed and high-capacity packet networking capabilities. The first book to explore this subject, Packet Forwarding Technologies explains in depth packet forwarding concepts and implementation technologies. It...
Information Assurance Architecture
Information Assurance Architecture
Safeguard Your Organization’s Information!

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information...

Multi-Objective Optimization in Computer Networks Using Metaheuristics
Multi-Objective Optimization in Computer Networks Using Metaheuristics
Many new multicast applications emerging from the Internet, such as Voice-over-IP (VoIP), videoconference, TV over the Internet, radio over the Internet, video streaming multipoint, etc., have the following resource requirements: bandwidth consumption, end-to-end delay, delay jitter, packet loss ratio, and so forth. It is therefore necessary to...
Modeling Software with Finite State Machines: A Practical Approach
Modeling Software with Finite State Machines: A Practical Approach
This book discusses a topic that is among the central questions of software development. Therefore, we must position ourselves in that area to justify our right to express our opinion on that topic. Saying “we” implies at least one person in the co-author group. We have worked for several years in software development using various...
Introduction to Forensic Sciences, Second Edition
Introduction to Forensic Sciences, Second Edition
This work is dedicated to students at all levels of education, who are interested
in the fascinating field of forensic science. The contents of this book, by
outstanding contributors, provides the reader with information on the various
fields of forensic science that may help them make a career choice or
add to their present
...
Geographic Profiling
Geographic Profiling
Scientific criminology has its roots in crime mapping. The first great systematic studies of crime were cartographic exercises made possible by recordkeeping systems created to track criminal convictions in France and England during the early part of the 19th century. Compared with maps of demographic, economic, and social...
Nanotechnology and Human Health
Nanotechnology and Human Health

Addressing medium- and long-term expectations for human health, this book reviews current scientific and technical developments in nanotechnology for biomedical, agrofood, and environmental applications. This collection of perspectives on the ethical, legal, and societal implications of bionanotechnology provides unique insight into...

Investigating Computer Crime
Investigating Computer Crime
Investigating Computer Crime will prove a welcome addition to any security department's library.
-Security Management

Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the
...
Neuroengineering
Neuroengineering
Comprehensive, practical, and broad in scope, Neuroengineering offers clinical insights on revolutionary technologies from prominent neurosurgeons and neurologists. This book presents a wide range of new developments in the field and high-impact emerging technologies that are poised to change the industry, described in detailed...
Duke's Handbook of Medicinal Plants of the Bible
Duke's Handbook of Medicinal Plants of the Bible

Known for their ease of use, artful presentation of scientific information, and evidence-based approach, James Duke’s comprehensive handbooks are the cornerstone in the library of almost every alternative and complementary medicine practitioner and ethnobotanist. Using the successful format of these bestselling handbooks,...

Result Page: Previous 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy