 |
|
|
 Microwave Circuit Modeling Using Electromagnetic Field SimulationThis unique 'how to' book is an ideal introduction to electromagnetic field-solvers. It provides you with helpful advice on selecting the right tools for your RF and high-speed digital circuit design work. The focus is on the strengths and weaknesses of the major commercial software packages. Featuring full-color illustrations, this practical... |  |  Configuring Windows 2000 Without Active DirectoryIn Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to... |  |  Deploying Windows 2000 with Support ToolsVisually, Windows 2000 is similar to previous versions of Windows. Its extensive new functionality, the overriding goal of which is to reduce an organization's "total cost of ownership," however, makes the system administrator's life easier. This translates to quicker software installation, more efficient management, and easier... |
|
 Nuendo Power!Whether you are a musician, recording engineer, sound designer, video editor, or other type of media author, certainly you have noticed that the demands of audio production in today’s multimedia environment have increased dramatically. With the proliferation of surround sound systems in theaters, homes, and specialized... |  |  Absolute BSD: The Ultimate Guide to FreeBSD Welcome to Absolute BSD! This book is a one-stop shop for new UNIX administrators who want to build, configure, and manage dedicated FreeBSD servers. It will also be useful for those folks who want to run FreeBSD on their desktop or combined desktop/server systems. By the time you finish this book, you... |  |  Implementing SSH: Strategies for Optimizing the Secure Shell Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to... |
|
|
Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 |