 |
|
 Grid Computing: Making The Global Infrastructure a Reality"A few years ago ‘The Grid’ emerged as one of the most important new developments in building the infrastructure for computational science in the 21st century. The tremendous enthusiasm for grid computing has led to an extremely rapid growth of our knowledge about how to make grids a reality. This is a timely book with... |  |  Rf And Baseband Techniques for Software Defined RadioSoftware defined radio (SDR) is an emerging form of radio architecture, which encompasses a wide range of design techniques in order to realize a truly flexible, and potentially future-proof, transceiver system. As a field, it is very broad, encompassing: systems design, RF, IF, and baseband analogue hardware design, digital ... |  |  Nonlinear Microwave and RF Circuits, 2nd Edition
Back in the days when I had a lot more energy and a lot less sense, I wrote
the first edition of this book. I had just finished writing Microwave Mixers,
and friends kept asking me, “Well, are you going to write another one?”
Sales of Mixers were brisk, and the feedback from readers was
encouraging,... |
|
 |  |  |  |  Quake 4 Mods For Dummies (Computer/Tech)If this is your first time venturing into the world of game modding, let me post a warning now. You are entering into something that many people, including myself, have described as addicting, exciting, and frustrating all at the same time. I know of very few people who have started on the path of game modification and found it... |
|
 The Unofficial Guide to Managing Rental PropertyWhether you own a single-family home, a duplex, a triplex, or multiple units, if you rent it out, you’re a landlord. And as a landlord, you need good information. This book begins with the basics and takes you through many different steps along the way. Aimed primarily at landlords just getting into the business, ... |  |  |  |  Managing Cisco Network SecurityProviding good internetwork security and remaining current on new hardware and software products is a never-ending task. Every network security manager aims to achieve the best possible security because the risks are real and the stakes are high. An enterprise must decide what level of security is required, taking into account... |
|
|
Result Page: 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 |