This book addresses 60 GHz technology for Gbps WLAN and WPAN from theory to practice, covering key aspects for successful deployment.(e.g. huge unlicensed bandwidth worldwide, high transmit power, high frequency reuse and small form factor), which enables many disruptive applications that are otherwise difficult if not impossible to be realized at lower frequencies. The book addresses all aspects of the state-of-the-art in 60 GHz technology for high data rate wireless applications.
Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts
14 January 2011
60GHz Technology for Gbps WLAN and WPAN: From Theory to Practice
This book addresses 60 GHz technology for Gbps WLAN and WPAN from theory to practice, covering key aspects for successful deployment.(e.g. huge unlicensed bandwidth worldwide, high transmit power, high frequency reuse and small form factor), which enables many disruptive applications that are otherwise difficult if not impossible to be realized at lower frequencies. The book addresses all aspects of the state-of-the-art in 60 GHz technology for high data rate wireless applications.
24 December 2010
Self-Organization in Sensor and Actor Networks
Self-Organization in Sensor and Actor Networks explores self-organization mechanisms and methodologies concerning the efficient coordination between intercommunicating autonomous systems.Self-organization is often referred to as the multitude of algorithms and methods that organise the global behaviour of a system based on inter-system communication. Studies of self-organization in natural systems first took off in the 1960s. In technology, such approaches have become a hot research topic over the last 4-5 year.
03 December 2010
Towards Hardware-Intrinsic Security
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.
19 November 2010
Beginning Oracle Database 11g Administration: From Novice to Professional
Open the door to a career as an Oracle database administrator as you learn to plan for and install the Oracle Database software. Then learn the rudiments of database administration from longtime Oracle expert Iggy Fernandez. Take advantage of the high demand for Oracle expertise and use Beginning Oracle Database 11g Administration to launch you on the right track to Oracle DBA career success.
* Gets you started in all key areas of database administration
* Provides a sound foundation on which to build your career
* Written in a clear, to-the-point style by Oracle expert and popular speaker Iggy Fernandez
12 November 2010
Solaris Application Programming
Solaris Application Programming /by Darryl Gove . Solaris™ Application Programming is a comprehensive guide to optimizing the performance of applications running in your Solaris environment. From the fundamentals of system performance to using analysis and optimization tools to their fullest, this wide-ranging resource shows developers and software architects how to get the most from Solaris systems and applications.
Whether you’re new to performance analysis and optimization or an experienced developer searching for the most efficient ways to solve performance issues, this practical guide gives you the background information, tips, and techniques for developing, optimizing, and debugging applications on Solaris.
The text begins with a detailed overview of the components that affect system performance. This is followed by explanations of the many developer tools included with Solaris OS and the Sun Studio compiler, and then it takes you beyond the basics with practical, real-world examples. In addition, you will learn how to use the rich set of developer tools to identify performance problems, accurately interpret output from the tools, and choose the smartest, most efficient approach to correcting specific problems and achieving maximum system performance.
05 November 2010
Wireless A To Z
Network Essentials guides consist of 100 3-5 page articles, heavily illustrated, covering the basic concepts, technologies, standards and protocols – everything you need to master the field. Wireless A to Z covers the key concepts and technologies of wireless and mobile communications. From traditional topics like CDMA and signal hand-offs to cutting edge mobile applications like WiFi and Bluetooth, this is a precise – and concise – quick look up reference to the industry.
29 October 2010
SIP Communications for Dummies
SIP is transforming instant messaging, voice, and video communications, by adding intelligence and reducing cost. The new world standard for facilitating communications, SIP makes it easier to communicate with the right people, at the right time, on the right device. This book shows you how SIP can be easily integrated into any large or small enterprise to lower cost, improve productivity, and simplify communications.
22 October 2010
Siebel VB Language Reference V7.7
Siebel VB is an enhanced configuration environment which includes:
■ A fully functional procedural programming language
■ A bidirectional application interface to provide bidirectional access to Siebel Business Objects
■ An editing environment to create and maintain custom Siebel VB routines
■ A debugger to assist in detecting errors in Siebel VB routines
■ A compiler to compile the custom Siebel VB routines
■ A run-time engine (similar to a Basic interpreter) to process the custom Siebel VB routines
You can use Siebel VB to create scripts that automate a variety of daily tasks.
Developers looking for scripting functionality on their UNIX-hosted Siebel Object Managers should read Siebel eScript Language Reference.
15 October 2010
The Art of Intrusion
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers is a book by Kevin Mitnick that is a collection of stories about social engineering as performed by other hackers. Each story ends by summarizing insight into the attack as well as measures to defend against it. The book was published after Mitnick's first book, The Art of Deception, and explores the same themes introduced in the first book.
08 October 2010
Top 10 Secrets of the “World’s Greatest Cover Letter”
It will take you just 15 minutes to finish reading this book. If you are searching for employment, I predict this will be the most profitable 15 minutes of your job-seeking life. Read every word right now (no cheating!☺) and I promise you’ll never look at your job search the same way again.
Whether you’re a college graduate starting out, a seasoned career professional or perhaps changing careers for the first time in your life, whatever your current employment situation, the secrets revealed in this book are unlike anything you’ve read before.
24 September 2010
Windows Vista Just the Steps For Dummies
Just the steps you need to get going with Vista today!
Simple steps...
...for great results
Move a File or Folder
Right-click Start menu button and choose Explore.
In the resulting Windows Explorer window (see Figure 3-8), double-click a folder or series of folders to locate the file that you want to move.
Take the following action:
Click and drag the file to another folder in the Folders pane on the left side of the window. If you right-click and drag, you are offered the options of moving or copying the item when you place it via the shortcut menu that appears.
Get Ready To
Use built-in Windows applications
Manage files and folders
Get online safely
Set up a network
Use anti-virus and anti-spyware tools
Play games, music, and slide shows
About the Author
Nancy Muir has written over 50 books on topics ranging from desktop applications to online safety and distance learning. She has also contributed articles to several national magazines on topics such as distance learning and home design. Prior to her freelance career, Nancy worked in the software and book publishing industries and has taught technical writing at the university level. She holds a certificate in distance learning design.
Simple steps...
...for great results
Move a File or Folder
Right-click Start menu button and choose Explore.
In the resulting Windows Explorer window (see Figure 3-8), double-click a folder or series of folders to locate the file that you want to move.
Take the following action:
Click and drag the file to another folder in the Folders pane on the left side of the window. If you right-click and drag, you are offered the options of moving or copying the item when you place it via the shortcut menu that appears.
Get Ready To
Use built-in Windows applications
Manage files and folders
Get online safely
Set up a network
Use anti-virus and anti-spyware tools
Play games, music, and slide shows
About the Author
Nancy Muir has written over 50 books on topics ranging from desktop applications to online safety and distance learning. She has also contributed articles to several national magazines on topics such as distance learning and home design. Prior to her freelance career, Nancy worked in the software and book publishing industries and has taught technical writing at the university level. She holds a certificate in distance learning design.
17 September 2010
The Little Black - Book of Computer Virus
This is the first in a series of three books about computer viruses. In these volumes I want to challenge you to think in new ways about viruses, and break down false concepts and wrong ways of thinking, and go on from there to discuss the relevance of computer viruses in today world. These books are not a call to a witch hunt, or manuals for protecting yourself from viruses. On the contrary, they will teach you how to design viruses, deploy them, and make them better. All three volumes are full of source code for viruses, including both new and well known varieties.
10 September 2010
VB NET Language in a Nutshell
The extensive changes to Visual Basic and the newness of the .NET platform call for a VB .NET reference guide oriented toward professional developers--those deeply experienced in Visual Basic and those adding VB .NET to their list of mastered languages. VB .NET Language in a Nutshell answers the call. As a reference book, it doesn't waste space on simple concepts, but documents, using practical examples, how language elements work, alternative approaches, optimal usage, and potential pitfalls.
As a quick introduction, the first section of VB .NET Language in a Nutshell leads you through the important areas of programming VB .NET, including:
* Variables and Data Types
* Introduction to Object Oriented Programming
* The .NET Framework: General Concepts
* The .NET Framework Class Library
* Delegates and Events
* Error Handling
The meat of the book is the alphabetical reference to the functions, statements, directives, objects, and object members that make up the VB .NET language. As an experienced developer, you can quickly get the whole story on a language element that interests you or seems to be behaving unexpectedly in your code. To ease your transition to .NET, there's a "VB .NET/VB 6 Differences" section for each language element.
A hefty appendix section includes:
* What's New and Different in VB .NET
* Language Elements by category
* Operators
* Constants and Enumerations
* The VB .NET Command Line Compiler
* VB 6 Language Elements Not Supported by VB .NET
No matter how much experience you have programming with VB, this is the kind of book you'll want to have close by, both as your standard reference guide and as a tool for troubleshooting and identifying programming problems.
27 August 2010
OOP with Microsoft Visual Basic.NET and Microsoft Visual C
This intuitive, self-paced learning title is designed to help any developer master the basics of object-oriented programming (OOP) with Microsoft Visual Basic.NET or Microsoft Visual C#. Unlike other books on OOP, this step-by-step guide provides readers with clear, peer-level language while it illustrates concepts with concrete, engaging examples, and coding practice exercises. Readers learn how to create and implement objects, master fully object-oriented design, migrate to Microsoft .NET programming and even create their own objects.
23 July 2010
Programming Visual Basic NET
The purpose of this book is to provide experienced software developers with the means to quickly become productive in Microsoft's Visual Basic .NET development environment. The only assumption I make about you as a programmer is that you're comfortable with the concepts and processes of software development. This book will not teach you how to program. However, if you're currently a working Visual Basic, C++, or Java developer, this book will help you transfer your existing skills to this new environment.
02 July 2010
Photoshop CS2 for Dummies (Edited)
If you’re a photography hobbyist, would you like to brighten up that gloomy island vacation photo? Slim down without going on a diet? See whether white or green shutters look best on the house? Expunge the ex-boyfriend from family photos? If you’re a pro or semi-pro photographer, would you like to make it snow in that ski resort photo? Replace the old logo in the glamour shot of the corporate headquarters with the new one? Grow hair in the CEO’s glaring bald spot? Freshen up the lettuce in that food shot?
You’ve come to the right place. With Photoshop CS2, you have the tools. With Photoshop CS2 For Dummies, you’ll have the know-how. In full color, with all kinds of examples, screen shots, step-by-step explanations, tips, and techniques, this guide takes you from the fundamentals to special power-user tricks! Cross-platform Mac-PC coverage includes:
You’ve come to the right place. With Photoshop CS2, you have the tools. With Photoshop CS2 For Dummies, you’ll have the know-how. In full color, with all kinds of examples, screen shots, step-by-step explanations, tips, and techniques, this guide takes you from the fundamentals to special power-user tricks! Cross-platform Mac-PC coverage includes:
- The basics of getting around in Photoshop, getting images into and out of Photoshop, choosing the right file formats, and setting your preferences
- Working with Adobe Bridge to organize and manage your images
- Working with tonality, including making easy Auto Repairs, making adjustments with Levels and Curves (and the eyedroppers), and using Shadow/Highlight and the toning tools, Burn and Dodge
- Making color look natural using the color adjustment commands
- Taking advantage of the RAW format for maximum flexibility, including using the Adjust, Detail, Lens, Curve, and Calibrate tabs and the Camera Raw buttons
- Fine-tuning your fixes, including making your selections with tools (four marquee tools, three lasso tools, and the Magic Wand tool)
- Masking for both layer visibility and for protecting parts of your images
- The most common problems in digital photos—red-eye, wrinkles, unwanted objects and people, and noise—and what to do about them
25 June 2010
Photoshop CS Javascript Reference Guide
This reference guide describes the objects and commands in the Adobe® Photoshop® CS
JavaScript type library. In addition to this Introduction, it includes the following sections:
• Chapter 2 -- Describes how to create user interface elements using JavaScript
• Chapter 3 -- Describes how to use File and Folder objects to abstract platform interfaces
• Chapter 4 -- Describes Debugging tools and techniques
• Chapter 5 -- Describes how to use Action Manager within JavaScripts
• Chapter 6 -- Describes the classes, properties and methods of the JavaScript interface
• Chapter 7 -- Describes the fundamental syntax of JavaScript
04 June 2010
Managing the Windows 2000 Registry
The Windows 2000 Registry is the repository for all hardware, software, and application configuration settings. Managing the Windows 2000 Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. A "must-have" for every 2000 system manager or administrator, it covers what the Registry is and where it lives on disk, available tools, Registry access from programs, and Registry content.
16 April 2010
Introducing Silverlight 1.1
In this Short Cut, we'll take a close look at Silverlight 1.1 and bring clarity to this bleeding-edge technology.
First we'll take a broad look at the new concept of Rich Internet Applications and how Silverlight fits into that picture. Then we'll examine how you work with Silverlight 1.1, highlighting tools, concepts, and code that you will need to build these interactive applications. Finally, we'll take a practical look at using Silverlight 1.1 to build a custom control, pulling all of the concepts and tools together.
Join ASP.NET Master and Telerik Chief Technical Evangelist Todd Anglin and the Telerik Team as they guide you to understanding Silverlight 1.1.
First we'll take a broad look at the new concept of Rich Internet Applications and how Silverlight fits into that picture. Then we'll examine how you work with Silverlight 1.1, highlighting tools, concepts, and code that you will need to build these interactive applications. Finally, we'll take a practical look at using Silverlight 1.1 to build a custom control, pulling all of the concepts and tools together.
Join ASP.NET Master and Telerik Chief Technical Evangelist Todd Anglin and the Telerik Team as they guide you to understanding Silverlight 1.1.
09 April 2010
How To Cheat At Windows System Administration Using Command Line Scripts
This book is designed to help you learn the power of Windows command shell.There was a time in the history of computers when there was no graphical user interface (GUI), and every small and big task was performed using the commands and batch files.With every new version of Windows, Microsoft is trying to ease administrators’ jobs by adding more and more layers of GUI or configuration wizards (dialog boxes).
Although these “wizards” are interactive and make the administrator’s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks.These wizards are time-consuming and, at times, may seem a bit confusing.There is certainly a way to avoid these wizards and still accomplish a given task using the command-line utilities included with the operating system.
Search This Blog
Blog Archive
Labels
- Adult (13)
- Business (10)
- Comic Book (1)
- Computer (24)
- Education (29)
- Electronic (1)
- Internet (4)
- Islamic (1)
- Love And Romance (14)
- Photography (5)
- Programming (7)
- Religious (1)