Home | Amazing | Today | Tags | Publishers | Years | Search 
CDMA RF System Engineering (Artech House Mobile Communications Library)
CDMA RF System Engineering (Artech House Mobile Communications Library)

Understand the essentials of CDMA wireless technology and develop the knowledge you need to design and operate either co-located AMPS and CDMA or dedicated CDMA systems with this unique reference. Drawing upon his recent experience in building the first major CDMA network in North America, the author helps you acquire the knowledge you need...

Gsm and Personal Communications Handbook (Artech House Mobile Communications Library)
Gsm and Personal Communications Handbook (Artech House Mobile Communications Library)
Here is the most comprehensive reference available on GSM applications and services that?s intended to build on -- not replace -- the basic technical information in the authors? original bestseller, An Introduction to GSM. The book provides a close-up look at this hot technology, offers in-depth discussions of the features and services available...
Java Cryptography (Java Series)
Java Cryptography (Java Series)
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application
programmer's arsenal. Cryptography provides three services that are crucial in secure programming.
These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates,
which prove identity
...
User-Centered Information Design for Improved Software Usability (Artech House Computer Science Library)
User-Centered Information Design for Improved Software Usability (Artech House Computer Science Library)
Describes a unique user-centered design method that helps the software project team decide what information to provide and in what media, based on user's information needs and project requirements. DLC: User interfaces (Computer systems).

About the Author

Pradeep Henry has more than 10 years
...
3D QSAR in Drug Design: Volume 2: Ligand-Protein Interactions and Molecular Similarity
3D QSAR in Drug Design: Volume 2: Ligand-Protein Interactions and Molecular Similarity
Volumes 2 and 3 of the 3D QSAR in Drug Design series aim to review the progress being made in CoMFA and other 3D QSAR approaches since the publication of the highly successful first volume about four years ago.

Volume 2
(Ligand-Protein Interactions and Molecular Similarity) divides into three sections
...
Microsoft Exchange Server Training (Microsoft Official Curriculum)
Microsoft Exchange Server Training (Microsoft Official Curriculum)
MICROSOFT EXCHANGE SERVER TRAINING KIT is Microsoft's introduction to the core technologies of Microsoft Exchange Server. It shows how to implement and administer Microsoft Exchange in a single-site or multiple-site environment. The kit covers installing and configuring the Microsoft Outlook(tm) desktop information manager client and installing...
Protecting Networks with SATAN
Protecting Networks with SATAN

SATAN (Security Administrator's Tool for Analyzing Networks) is a powerful aid for system administrators. It performs "security audits," scanning host computers for security vulnerabilities caused by erroneous configurations or by known software errors in frequently used programs. SATAN is a particularly interesting piece of...

Diagnosis and Treatment of Radiation Injuries (Safety Report, Iaea Comprehensive No Inis Ser. Series, 8000)
Diagnosis and Treatment of Radiation Injuries (Safety Report, Iaea Comprehensive No Inis Ser. Series, 8000)
According to the International Basic Safety Standards an accident is “any unintended event, including operating errors, equipment failures or other mishaps, the consequences or potential consequences of which are not negligible from the point of view of protection or safety” [1].

A radiological accident
...
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

 

Byte, September 1995

 

...
Java Security (Java Series)
Java Security (Java Series)

Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with...

MCSE: The Core Exams in a Nutshell (In a Nutshell (O'Reilly))
MCSE: The Core Exams in a Nutshell (In a Nutshell (O'Reilly))

Microsoft's MCSE (Microsoft Certified Systems Engineer) program is a rigorous testing and certification program for Windows NT system and network administrators. To achieve certification, one must pass four required exams and two elective exams. Close to twenty potential elective exams exist, although only nine of them are...

Windows NT Backup & Restore
Windows NT Backup & Restore

As the number of mission-critical applications running on Windows NT grows, it becomes vital for administrators to safeguard data from loss or corruption. While a myriad of Microsoft and third-party software and hardware solutions are currently available (and more are becoming available every day), there is very little guidance for...

Result Page: Previous 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy