Home | Amazing | Today | Tags | Publishers | Years | Search 
Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
Spread Spectrum and CDMA: Principles and Applications
Spread Spectrum and CDMA: Principles and Applications
Spread spectrum and CDMA are cutting-edge technologies widely used in operational radar, navigation and telecommunication systems and play a pivotal role in the development of the forthcoming generations of systems and networks.

This comprehensive resource presents the spread spectrum concept as a product of the advancements in wireless IT,...

IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
Digital Image Processing: PIKS Scientific Inside
Digital Image Processing: PIKS Scientific Inside

A newly updated and revised edition of the classic introduction to digital image processing

The Fourth Edition of Digital Image Processing provides a complete introduction to the field and includes new information that updates the state of the art. The text offers coverage of new topics and...

Innovate or Perish: Managing the Enduring Technology Company in the Global Market
Innovate or Perish: Managing the Enduring Technology Company in the Global Market
Essential reading for IP managers and corporate executives, Innovate or Perish is a new road map equipping readers with the principles and tools needed for their companies to compete in the emerging creativity economy. Edited by Edward Kahn, this seminal book includes contributions from seasoned intellectual property (IP)...
RFID-A Guide to Radio Frequency Identification
RFID-A Guide to Radio Frequency Identification
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
FileMaker Pro 8.5 Bible
FileMaker Pro 8.5 Bible
FileMaker Pro 8.5 Bible provides step-by-step procedures for using virtually all FileMaker Pro features and performing all tasks. This best-selling volume has been updated to reflect Version 8.5, the latest version of FileMaker Pro workgroup database. Applicable to both the Mac and Windows versions of FileMaker Pro, this...
Photoshop CS Bible
Photoshop CS Bible
"I’ve learned more from Deke’s Photoshop Bible than any Photoshop book, ever."
-- Scott Kelby, President, National Association of Photoshop Professionals

"When someone asks me something I don’t know about Photoshop, I tell them to go read the Photoshop Bible. It does something no other book does -- it...

Speech Processing for IP Networks: Media Resource Control Protocol (MRCP)
Speech Processing for IP Networks: Media Resource Control Protocol (MRCP)

Media Resource Control Protocol (MRCP) is a new IETF protocol, providing a key enabling technology that eases the integration of speech technologies into network equipment and accelerates their adoption resulting in exciting and compelling interactive services to be delivered over the telephone. MRCP leverages IP telephony and Web technologies...

Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)

Learn how to employ JADE to build multi-agent systems!

JADE (Java Agent DEvelopment framework) is a middleware for the development of applications, both in the mobile and fixed environment, based on the Peer-to-Peer intelligent autonomous agent approach. JADE enables developers to implement and...

Modeling Structured Finance Cash Flows with MicrosoftВ Excel: A Step-by-Step Guide (Wiley Finance)
Modeling Structured Finance Cash Flows with MicrosoftВ Excel: A Step-by-Step Guide (Wiley Finance)
A practical guide to building fully operational financial cash flow models for structured finance transactions

Structured finance and securitization deals are becoming more commonplace on Wall Street. Up until now, however, market participants have had to create their own models to analyze these deals, and new entrants have...

Wireless Sensor Networks: Technology, Protocols, and Applications
Wireless Sensor Networks: Technology, Protocols, and Applications
Infrastructure for Homeland Security Environments

Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way...

Result Page: 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy