برچسب: ایبوک کامپیوتر

  • دانلود کتابCFA Program Curriculum 2019 Level I Volumes

    دانلود کتابCFA Program Curriculum 2019 Level I Volumes

    دانلود کتاب دانلود کتاب CFA Program Curriculum 2019 Level I Volumes 1-6 Box Set

    جهت دانلود کتاب دانلود کتاب CFA Program Curriculum 2019 Level I Volumes 1-6 Box Set با ما مکاتبه کنبد. کتاب دانلود کتاب CFA Program Curriculum 2019 Level I Volumes 1-6 Box Set پس از واریز هزینه ارسال میشود. ایبوک 9781946442253در آرشیو گیگاپیپر موجود است.

    دانلود کتاب CFA Program Curriculum 2019 Level I Volumes 1-6 Box Set شابک ISBN: 9781946442253 نویسنده  CFA Institute  Cfa Curriculum 2019  8th November 2018 گیگاپیپر
    دانلود کتاب CFA Program Curriculum 2019 Level I Volumes 1-6 Box Set شابک ISBN: 9781946442253 نویسنده CFA Institute Cfa Curriculum 2019 8th November 2018

    CFA Program Curriculum 2019 Level I Volumes 1-6 Box Set
    Cfa Curriculum 2019
    By: CFA Institute

     Published: 8th November 2018
    ISBN: 9781946442253
    Number Of Pages: 3712

    Free Download Some Pages Before Pay

    درباره ایبوکCFA Program Curriculum 2019 Level I Volumes 1-6 Box Set

    Clear, concise instruction for all CFA Program Level I concepts and competencies for the 2019 exam

    The same official curricula that CFA Program candidates receive with program registration is now publicly available for purchase. CFA Program Curriculum 2019 Level I, Volumes 1-6 provides the complete Level I curriculum for the 2019 exam, delivering the Candidate Body of Knowledge (CBOK) with expert instruction on all 10 topic areas of the CFA Program. Fundamental concepts are explained in-depth with a heavily visual style, while cases and examples demonstrate how concepts apply in real-world scenarios. Coverage includes ethical and professional standards, quantitative analysis, economics, financial reporting and analysis, corporate finance, equities, fixed income, derivatives, alternative investments, and portfolio management, all organized into individual sessions with clearly defined Learning Outcome Statements. Charts, graphs, figures, diagrams, and financial statements illustrate concepts to facilitate retention, and practice questions provide the opportunity to gauge your understanding while reinforcing important concepts.

    Learning Outcome Statement checklists guide readers to important concepts to derive from the readings
    Embedded case studies and examples throughout demonstrate practical application of concepts
    Figures, diagrams, and additional commentary make difficult concepts accessible
    Practice problems support learning and retention
    CFA Institute promotes the highest standards of ethics, education, and professional excellence among investment professionals. The CFA Program curriculum guides you through the breadth of knowledge required to uphold these standards.

    درباره نویسنده کتاب CFA Program Curriculum 2019 Level I Volumes 1-6 Box Set

    CFA Institute is the global association of investment professionals that sets the standard for professional excellence and credentials. The organization is a champion for ethical behavior in investment markets and a respected source of knowledge in the global financial community. The end goal: to create an environment where investors’ interests come first, markets function at their best, and economies grow. CFA Institute has more than 155,000 members in 165 countries and territories, including 150,000 CFA® charterholders, and 148 member societies. For more information, visit www.cfainstitute.org.

  • دانلود کتاب  Corrosion Analysis

    دانلود کتاب Corrosion Analysis

    دانلود کتاب Corrosion Analysis

    جهت دانلود کتاب  Corrosion Analysis با ما مکاتبه کنبد.  کتاب Corrosion Analysis پس از واریز هزینه ارسال میشود. ایبوک  9781138632042 در آرشیو گیگاپیپر موجود است.

    دانلود کتاب Corrosion Analysis کتاب تجزیه و تحلیل خوردگی ایبوک ISBN-10: 113863204X گیگاپیپر
    دانلود کتاب Corrosion Analysis کتاب تجزیه و تحلیل خوردگی ایبوک ISBN-10: 113863204X

    Corrosion Analysis 1st Edition
    by Michael Dornbusch (Author)

    Hardcover: 336 pages
    Publisher: CRC Press; 1 edition (October 2, 2018)
    Language: English
    ISBN-10: 113863204X
    ISBN-13: 978-1138632042

    Price: 10$

    Free Download Some Pages Before Pay

    درباره ایبوک Corrosion Analysis

    The book gives an overview about all relevant electrochemical and spectroscopic methods used in corrosion research. Besides the correct use and interpretation, the methods are correlated with industrial test methods for organic coatings and conversion layers.

    درباره نویسنده تجزیه و تحلیل خوردگی

    Since 2011 Michael Dornbusch has been a professor for coatings technology at the Niederrhein University of Applied Sciences in Krefeld, Germany. His research is focused on corrosion protective coatings and transport processes in coatings. It is a continuation of his eight years working in the coatings industry focused on corrosion protective coatings for the automotive, marine, aircraft and fastener industries in different companies in Germany. In his teaching he foscused on EU legislation for chemicals, electrochemistry, spectroscopy, coating application and processes.

     

    فهرست کتاب تجزیه و تحلیل خوردگی

    Contents
    Basics
    Basics in Atmospheric Corrosion
    Basics in Corrosion Processes
    Basics in Inorganic Coatings
    Basics in Organic Coatings
    Literature
    Electrochemical Methods
    Electrochemical Methods on the Metal Surface
    Electrochemical Methods on the Coating Surface
    Literature
    Spectroscopic Methods
    Spectroscopic Methods on the Metal Surface
    Spectroscopic Methods on the Coating Surface
    Literature
    Investigation of the Corrosion Rate
    Scientific Methods
    Industrial Methods
    Literature
    Appendix
    Survey of the Examples ordered by Themes
    Electrochemical Data
    Spectroscopic Data
    Mathematical Relations of Complex Numbers
    Literature

  • دانلود کتاب  Resource Allocation for Wireless Networks: Basics, Techniques, and Applications

    دانلود کتاب Resource Allocation for Wireless Networks: Basics, Techniques, and Applications

    دانلود کتاب Resource Allocation for Wireless Networks: Basics, Techniques, and Applications

    جهت دانلود کتاب  Resource Allocation for Wireless Networks: Basics, Techniques, and Applications با ما مکاتبه کنبد.  کتاب Resource Allocation for Wireless Networks: Basics, Techniques, and Applications   پس از واریز هزینه ارسال میشود. ایبوک 9780521873857 در آرشیو گیگاپیپر موجود است.

    دانلود کتاب Resource Allocation for Wireless Networks: Basics کتاب اختصاص منابع برای شبکه های بی سیم: مبانی، تکنیک ها ایبوک 9780521873857 گیگاپیپر
    دانلود کتاب Resource Allocation for Wireless Networks: Basics کتاب اختصاص منابع برای شبکه های بی سیم: مبانی، تکنیک ها ایبوک 9780521873857

    Resource Allocation for Wireless Networks: Basics, Techniques, and Applications
    by Zhu Han (Author), K. J. Ray Liu (Author)

    Hardcover: 558 pages
    Publisher: Cambridge University Press (September 1, 2008)
    Language: English
    ISBN-10: 9780521873857
    ISBN-13: 978-0521873857
    ASIN: 0521873851

    Price: 10$

    Free Download Some Pages Before Pay

    درباره ایبوک Resource Allocation for Wireless Networks: Basics, Techniques, and Applications

    Merging the fundamental principles of resource allocation with the state-of-the-art in research and application examples, Han and Liu present a novel and comprehensive perspective for improving wireless systems performance. Cross-layer multiuser optimization in wireless networks is described systematically. Starting from the basic principles, such as power control and multiple access, coverage moves to the optimization techniques for resource allocation, including formulation and analysis, and game theory. Advanced topics such as dynamic resource allocation and resource allocation in antenna array processing, and in cooperative, sensor, personal area, and ultrawideband networks, are then discussed. Unique in its scope, timeliness, and innovative author insights, this invaluable work will help graduate students and researchers to understand the basics of wireless resource allocation whilst highlighting modern research topics, and will help industrial engineers to improve system optimization.

    درباره نویسنده اختصاص منابع برای شبکه های بی سیم: مبانی، تکنیک ها و برنامه های کاربردی

    Zhu Han is currently an Assistant Professor in the Electrical and Computer Engineering Department at Boise State University, Idaho. In 2003, he was awarded his Ph.D. in electrical engineering from the University of Maryland, College Park. Zhu Han has also worked for a period in industry, as an R & D Engineer for JDSD. Dr Han is PHY/MAC Symposium vice chair of IEEE Wireless Communications and Networking Conference, 2008.

     

    فهرست اختصاص منابع برای شبکه های بی سیم: مبانی، تکنیک ها و برنامه های کاربردی

    Contents
    Preface pagexi 1 Introduction
    1
    An Introduction
    9
    Power Control
    55
    Rate Adaptation
    75
    Multiple Access and Spectrum Access
    99
    Optimization Formulation and Analysis
    137
    Mathematical Programming
    154
    IntegerCombinatorial Optimization
    178
    Resource Allocation with AntennaArray Processing
    227
    Dynamic Resource Allocation
    263
    Resource Allocation for Cooperative Networks
    304
    GameTheoretic Approaches for Resource Allocation
    352
    Ad HocSensorPersonalArea Networks
    439
    Resource Allocation for Wireless Multimedia
    488
    Bibliography
    518
    Index
    539
    Game Theory
    203
    Copyright
  • دانلود کتاب SAFe 4.0 Distilled: Applying the Scaled Agile Framework for Lean Software and Systems Engineering

    دانلود کتاب SAFe 4.0 Distilled: Applying the Scaled Agile Framework for Lean Software and Systems Engineering

    دانلود کتاب SAFe 4.0 Distilled Applying the Scaled Agile Framework for Lean Software and Systems Engineering

    برای خرید کتاب SAFe 4.0 Distilled که در آرشیو گیگاپیپر موجود است، با ما مکاتبه کنید. نسخه کیندل کتاب راهنمای مرجع: چارچوب چابک مقیاس پذیر برای شرکت های Lean به همراه PDF تبدیل شده ارسال می شود.

    خرید کتاب کیندل SAFe 4.5 Reference Guide از امازون

    برای دانلود کتاب کیندل زیر از Amazon با ما مکاتبه کنید. این ایبوک در آرشیو گیگاپیپر موجود است.

     دانلود کتاب SAFe 4.0 Distilled Applying the Scaled Agile Framework for Lean Software and Systems Engineering خرید کتاب کیندل از امازون دریافت کتاب Kindle
    دانلود کتابSAFe 4.0 Distilled Applying the Scaled Agile Framework for Lean Software and Systems Engineering خرید کتاب کیندل از امازون دریافت کتاب Kindle

    SAFe 4.0 Distilled Applying the Scaled Agile Framework for Lean Software and Systems Engineering 1st Edition
    by Richard Knaster (Author), Dean Leffingwell (Author)

    Paperback: 384 pages
    Publisher: Addison-Wesley Professional; 1 edition (April 10, 2017)
    Language: English
    ISBN-10: 0134209427
    ISBN-13: 978-0134209425

    Price : 20$

     

    درباره ایبوک SAFe 4.0 Distilled: Applying the Scaled Agile Framework for Lean Software and Systems Engineering

    SAFe®: The World’s Leading Framework for Enterprise Agility“SAFe® 4.0 Distilled is the book we’ve all been waiting for. It breaks down the complexity of the Framework into easily digestible explanations and actionable guidance. A must-have resource for beginners as well as seasoned practitioners.”

    —Lee Cunningham, Sr. Director, Enterprise Agile Strategy at VersionOne, Inc.

    دانلود کتاب از pearson

    https://www.pearson.com/us/higher-education/product/Leffingwell-SA-Fe-4-0-Reference-Guide-Scaled-Agile-Framework-for-Lean-Software-and-Systems-Engineering/9780134510545.html

    To succeed in today’s adapt-or-die marketplace, businesses must be able to rapidly change the way they create and deliver value to their customers. Hundreds of the world’s most successful companies—including Hewlett Packard Enterprise, AstraZeneca, Cisco, and Philips—have turned to the Scaled Agile Framework® (SAFe®) to achieve agility at scale and maintain a competitive edge.

    Free Download SAFe 4.0 Distilled Applying the Scaled Agile Framework for Lean Software and Systems Engineering

    SAFe® 4.0 Distilled: Applying the Scaled Agile Framework® for Lean Software and Systems Engineering explains how adopting SAFe can quickly improve time to market and increase productivity, quality, and employee engagement.

    خرید کتاب SAFe 4.0 Distilled Applying the Scaled Agile Framework for Lean Software and Systems Engineering

    In this book, you will

    Understand the business case for SAFe: its benefits, the problems it solves, and how to apply it
    Get an overview of SAFe across all parts of the business: team, program, value stream, and portfolio
    Learn why SAFe works: the power of SAFe’s Lean-Agile mindset, values, and principles
    Discover how systems thinking, Agile development, and Lean product development form the underlying basis for SAFe
    Learn how to become a Lean-Agile leader and effectively drive an enterprise-wide transformation

  • دانلود کتاب SAFe 4.5 Reference Guide: Scaled Agile Framework for Lean Enterprises

    دانلود کتاب SAFe 4.5 Reference Guide: Scaled Agile Framework for Lean Enterprises

    دانلود کتاب SAFe 4.5 Reference Guide: Scaled Agile Framework for Lean Enterprises

    برای خرید کتاب SAFe 4.5 Reference Guide: Scaled Agile Framework for Lean Enterprises که در آرشیو گیگاپیپر موجود است، با ما مکاتبه کنید. نسخه کیندل کتاب راهنمای مرجع: چارچوب چابک مقیاس پذیر برای شرکت های Lean به همراه PDF تبدیل شده ارسال می شود.

    خرید کتاب کیندل SAFe 4.5 Reference Guide از امازون

    برای دانلود کتاب کیندل زیر از Amazon با ما مکاتبه کنید. این ایبوک در آرشیو گیگاپیپر موجود است.

     دانلود کتاب SAFe 4.5 Reference Guide: Scaled Agile Framework for Lean Enterprises خرید کتاب کیندل SAFe 4.5 Reference Guide از امازون دریافت کتاب Kindle
    دانلود کتاب SAFe 4.5 Reference Guide: Scaled Agile Framework for Lean Enterprises خرید کتاب کیندل SAFe 4.5 Reference Guide از امازون دریافت کتاب Kindle

    SAFe 4.5 Reference Guide: Scaled Agile Framework for Lean Enterprises (2nd Edition) 2nd Edition
    by Dean Leffingwell (Author)

    Series: Safe 4.5

    Paperback: 816 pages
    Publisher: Addison-Wesley Professional; 2 edition (May 20, 2018)
    Language: English
    ISBN-10: 9780134892863
    ISBN-13: 978-0134892863
    ASIN: 0134892860

    درباره ایبوک SAFe 4.5 Reference Guide: Scaled Agile Framework for Lean Enterprises (2nd Edition)

    “There are a lot of methods of scale out there, but the Scaled Agile Framework is the one lighting up the world.”

    –Steve Elliot, Founder/CEO AgileCraft

    “Since beginning our Lean-Agile journey with SAFe, Vantiv has focused its strategic efforts and its execution. We have improved the predictability of product delivery while maintaining high quality, and have become even more responsive to customers–resulting in higher customer satisfaction. And just as important, employee engagement went up over the past year.”

    دانلود کتاب از pearson

    http://catalogue.pearsoned.co.uk/educator/product/SAFe-45-Reference-Guide-Scaled-Agile-Framework-for-Lean-Software-and-Systems-Engineering/9780134892863.page

    –Dave Kent, Enterprise Agile Coach, Vantiv
    Fully updated to include the new innovations in SAFe 4.5, the SAFe® 4.5 Reference Guide is ideal for anyone serious about learning and implementing the world’s leading framework for enterprise agility. Inside, you’ll find complete coverage of the scaledagileframework.com knowledge base, the website that thousands of the world’s largest brands turn to for building better software and systems.

    SAFe was developed from real-world field experience and provides proven success patterns for implementing Lean-Agile software and systems development at enterprise scale. This book provides comprehensive guidance for work at the enterprise Portfolio, Large Solution, Program, and Team levels, including the various roles, activities, and artifacts that constitute the Framework.

    Education & Training Key to Success

    دریافت کتاب Kindle

    The practice of SAFe is spreading rapidly throughout the world. The majority of Fortune 100 companies have certified SAFe professionals and consultants, as do an increasing percentage of the Global 2000. Case study results–visit scaledagileframework.com/case-studies–typically include:

    30 — 75% faster time-to-market
    25 — 75% increase in productivity
    20 — 50% improvements in quality
    10 — 50% increased employee engagement
    Successful implementations may vary in context but share a common attribute: a workforce well trained and educated in SAFe practices. This book–along with authorized training and certification–will help you understand how to maximize the value of your role within a SAFe organization. The result is greater alignment and visibility, improved performance throughout the enterprise, and ultimately better outcomes for the business

  • دانلود kindle کتاب از امازون

    دانلود kindle کتاب از امازون

    دانلود kindle کتاب DAX patterns 2015

    برای دانلود کتاب DAX patterns 2015 با ما مکاتبه کنید. این کتاب در آرشیو گیگاپیپر موجود است و پس از واریز هزینه PDF ایبوک DAX patterns ارسال می شود.

    دانلود کتاب DAX patterns 2015

    DAX Patterns 2015 by [Ferrari, Alberto, Russo,Marco] گیگاپیپر

    DAX Patterns 2015 Paperback – December 19, 2014
    by Marco Russo (Author), Alberto Ferrari (Author), Daniele Perilli (Cover Design)

    Price : 3$
    Paperback: 286 pages
    Publisher: CreateSpace Independent Publishing Platform (December 19, 2014)
    Language: English
    ISBN-10: 1505623634
    ISBN-13: 978-1505623635

    دانلود kindle کتاب از امازون

    در صورتی که هر کتابی از امازون نیاز دارید، کافیست به بخش Buy a Kindle و یا ادرس https://www.amazon.com/gp/product/B00ZV9PXP2/?ie=UTF8&ref_=topnav_storetab_kstore بروید. در این بخش عنوان کتاب مورد نظر را وارد کنید. در صورتی که دارای نسخه Kindle باشد، با کمتر از 90 درصد قیمت اصلی برایتان تهیه می کنیم. برای دانلود kindle کتاب از امازون کافیست ادرس کتاب از آمازون را برای ما ارسال کنید.

    دانلود kindle کتاب DAX Patterns 2015 از امازون

    A pattern is a general reusable solution to a commonly occurring problem. This book is a collection of ready-to-use data models and formulas in DAX, that you can use in Power Pivot for Excel and in Microsoft Analysis Services Tabular. Create your data model faster by using a DAX pattern!

     

    Download Kindle DAX Patterns 2015

    Paperback: 286 pages
    Publisher: CreateSpace Independent Publishing Platform (December 19, 2014)
    Language: English
    ISBN-10: 1505623634
    ISBN-13: 978-1505623635

    دانلود PDF کتاب DAX Patterns

    دانلود kindle کتاب DAX Patterns 2015

    File Size: 16570 KB
    Print Length: 286 pages
    Publisher: Loader (December 19, 2014)
    Publication Date: December 19, 2014
    Sold by: Amazon Digital Services LLC
    Language: English
    ASIN: B00R96TOKA

    نویسنده کیندل کتاب DAX Patterns 2015

    در ادامه درباره نویسنده ایبوک الگوی DAX توضیحاتی آورده شده است.

    Marco Russo and Alberto Ferrari are the two founders of SQLBI (http: //www.sqlbi.com), where they regularly publish articles about Microsoft Power Pivot, DAX, and SQL Server Analysis Services Tabular. They both provide consultancy and mentoring on business intelligence (BI), with a particular specialization in the Microsoft technologies related to BI. They have written several books and papers about these topics, with a particular mention of “SQLBI methodology” (http: //sql.bi/methodology), which is a complete methodology for designing and implementing the back end of a BI solution; and “The Many-to-Many Revolution” (http: //sql.bi/m2m), which is a paper dedicated to modeling patterns using many-to-many dimension relationships in SQL Server Analysis Services and Power Pivot. Marco and Alberto are also regular speakers at major international conferences, such as TechEd, PASS Summit, SQLRally, and SQLBits

    What is a pattern?

    A pattern is a general reusable solution to a commonly occurring problem.
    In Microsoft Excel, you use patterns every day to build tables, charts, reports, dashboards, and more.

    DAX Patterns is a collection of ready-to-use data models and formulas in DAX, which is the programming language of Power Pivot. Create your Excel data model faster by using a DAX pattern!

    دانلود رایگان کتاب DAX Patterns 2015

    برای اینکه از کیفیت kindle کتاب DAX Patterns 2015 اطمینان پیدا کنید، چند صفحه از کتاب به صورت رایگان آورده شده است. برای دانلود PDF کتاب DAX Patterns با ما مکاتبه کنید.

    دانلود کتاب DAX patterns 2015 دانلود kindle کتاب از امازون خرید آمازونBuy a Kindle Download Kindle Book From Amazon دانلودPDF کتاب DAX patterns دانلود کیندل گیگاپیپر
    دانلود کتاب DAX patterns 2015 دانلود kindle کتاب از امازون خرید آمازونBuy a Kindle Download Kindle Book From Amazon دانلودPDF کتاب DAX patterns دانلود کیندل
    دانلود کتاب DAX patterns 2015 دانلود kindle کتاب از امازون خرید آمازون Download Free Kindle Download Kindle Book From Amazon دانلودPDF کتاب DAX patterns دانلود کیندل گیگاپیپر
    دانلود کتاب DAX patterns 2015 دانلود kindle کتاب از امازون خرید آمازونDownload Free Kindle Download Kindle Book From Amazon دانلودPDF کتاب DAX patterns دانلود کیندل
    دانلود کتاب DAX patterns 2015 دانلود kindle کتاب از امازون خرید آمازون Download Free AZW Download Kindle Book From Amazon دانلودPDF کتاب DAX patterns دانلود کیندل گیگاپیپر
    دانلود کتاب DAX patterns 2015 دانلود kindle کتاب از امازون خرید آمازونDownload Free AZW Download Kindle Book From Amazon دانلود PDF کتاب DAX patterns دانلود کیندل

    Free Download DAX Patterns 2015 – Alberto Ferrari PDF

    [pdf-embedder url=”http://www.GigaPaper.ir/wp-content/uploads/2018/08/Extracted-pages-1-15-Free-Download-DAX-Patterns-2015-Alberto-Ferrari.pdf” title=”Extracted pages 1-15, Free Download DAX Patterns 2015 – Alberto Ferrari”]

  • دانلود کتاب OCP Java SE 8 Programmer II Exam Guide

    دانلود کتاب OCP Java SE 8 Programmer II Exam Guide

    خرید کتاب OCP Java SE 8 Programmer II Exam Guide

    برای دریافت نسخه الکترونیکی کتاب OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809) 7th Edition با ما مکاتبه کنید. این کتاب در فرمتهای Epub , AZW , Mobi و همچنین فرمت PDF تبدیل شده موجود است. پس از واریز هزینه ایبوک ارسال می شود.

    دانلود کتاب OCP Java SE 8 Programmer II Exam Guide

     دانلود کتاب OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809) 7th Edition خرید ایبوک راهنمای آزمون برنامه نویسی جاوا دریافت PDF شابک 1260117383
    دانلود کتاب OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809) 7th Edition شابک 1260117383

    OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809) 7th Edition

    by Kathy Sierra (Author), Bert Bates (Author), Elisabeth Robson (Author)

    Price = 15$  ایمیل گیگاپیپر دانلود کتاب مقاله پایان نامه

    ISBN-13: 978-1260117387
    ISBN-10: 1260117383

    Print Length: 925 pages
    Publisher: McGraw-Hill Education; 7 edition (May 11, 2018)
    Publication Date: May 11, 2018

    درباره ایبوک OCP Java SE 8 Programmer II Exam Guide

    A Complete, Integrated Study System for OCP Exam 1Z0-809

    Study for the OCP Java SE 8 Programmer II exam using this effective exam preparation guide from Oracle Press. Written by a team of experts, including two developers of the original exam, OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809) offers comprehensive coverage of every subject on the test and lays out essential Java programming skills.

    Download OCP Java SE 8 Programmer II Exam Guide

    Throughout, step-by-step exercises; self-tests; and “Exam Watch,” “Inside the Exam,” and “On the Job” sections highlight salient points and aid in learning. In all, the book and accompanying digital content feature more than 350 practice questions that mirror those on the live test in tone, format, and content.

    Clearly explains every topic on Exam 1Z0-809, including:

    •Declarations, access control, and enums
    •Object orientation
    •Assertions and exceptions
    •Dates, times, locales, and resource bundles
    •I/O and NIO
    •Generics and collections
    •Inner classes
    •Lambda expressions and functional interfaces
    •Streams
    •Threads
    •Concurrency
    •JDBC

    Electronic content includes:

    •170 practice exam questions
    •Fully customizable test engine
    •Secured book PDF

    فهرست مطالب کتاب OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809)

    OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809)
    by Kathy Sierra

    Publisher: McGraw-Hill Education
    Print ISBN: 9781260117387, 1260117383
    eText ISBN: 9781260117370, 1260117375
    Edition: 7th
    Copyright year: 2018

    Cover
    Title Page
    Copyright Page
    Dedication
    Contents
    Acknowledgments
    Preface
    Introduction
    1 Declarations, Access Control, and Enums
    Java Class Design and Object Orientation: A Refresher
    Define Classes and Interfaces (OCP Objectives 1.2, 2.1, and 2.2)
    Class Declarations and Modifiers
    Exercise 1-1: Creating an Abstract Superclass and Concrete Subclass
    Use Interfaces (OCP Objective 2.5)
    Declaring an Interface
    Declaring Interface Constants
    Declaring default Interface Methods
    Declaring static Interface Methods
    Declare Class Members (OCP Objectives 1.2, 1.6, 2.1, and 2.2)
    Access Modifiers
    Nonaccess Member Modifiers
    Constructor Declarations
    Variable Declarations
    Declare and Use enums (OCP Objective 2.4)
    Declaring enums
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    2 Object Orientation
    Encapsulation (OCP Objective 1.1)
    Inheritance and Polymorphism (OCP Objectives 1.2 and 1.3)

    ocp java se 8 programmer ii exam guide pdf

    The Evolution of Inheritance
    IS-A and HAS-A Relationships
    Polymorphism (OCP Objective 1.3)
    Overriding/Overloading (OCP Objectives 1.2, 1.3, and 2.5)
    Overridden Methods
    Overloaded Methods
    Casting (OCP Objectives 1.2 and 1.3)
    Implementing an Interface (OCP Objective 2.5)
    Java 8—Now with Multiple Inheritance!
    Legal Return Types (OCP Objectives 1.2 and 1.3)
    Return Type Declarations
    Returning a Value
    Constructors and Instantiation (OCP Objectives 1.2 and 1.3)
    Constructor Basics
    Constructor Chaining
    Rules for Constructors
    Determine Whether a Default Constructor Will Be Created
    Overloaded Constructors
    Singleton Design Pattern (OCP Objective 1.5)
    What Is a Design Pattern?
    Problem
    Solution
    Benefits
    Immutable Classes (OCP Objective 1.5)
    Initialization Blocks (OCP Objective 1.6)
    Statics (OCP Objective 1.6)
    Static Variables and Methods
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    3 Assertions and Java Exceptions
    Working with the Assertion Mechanism (OCP Objective 6.5)
    Assertions Overview
    Using Assertions
    Using Assertions Appropriately
    Working with Exception Handling (OCP Objectives 6.1, 6.2, 6.3, and 6.4)
    Use the try Statement with multi-catch and finally Clauses
    AutoCloseable Resources with a try-with-resources Statement
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers

    ocp: oracle certified professional java se 8 programmer ii study guide: exam 1z0-809 pdf

    4 Dates, Times, Locales, and Resource Bundles
    Dates, Times, and Locales (OCP Objectives 7.1, 7.2, 7.3, and 12.1)
    Working with Dates and Times
    The java.time.* Classes for Dates and Times
    Properties Files (OCP Objective 12.2)
    Resource Bundles (OCP Objectives 12.1, 12.2, and 12.3)
    Java Resource Bundles
    Default Locale
    Choosing the Right Resource Bundle
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    5 I/O and NIO
    File Navigation and I/O (OCP Objectives 8.1 and 8.2)
    Creating Files Using the File Class
    Using FileWriter and FileReader
    Using FileInputStream and FileOutputStream
    Combining I/O Classes
    Working with Files and Directories
    The java.io.Console Class
    Files, Path, and Paths (OCP Objectives 9.1 and 9.2)
    Creating a Path
    Creating Files and Directories
    Copying, Moving, and Deleting Files
    Retrieving Information about a Path
    Normalizing a Path
    Resolving a Path
    Relativizing a Path
    File and Directory Attributes (OCP Objective 9.2)
    Reading and Writing Attributes the Easy Way
    Types of Attribute Interfaces
    Working with BasicFileAttributes
    Working with DosFileAttributes
    Working with PosixFileAttributes
    Reviewing Attributes
    DirectoryStream (OCP Objectives 9.2 and 9.3)

    OCP Java SE 8 Programmer II Exam Guide Free PDF Download

    FileVisitor
    PathMatcher
    WatchService
    Serialization (Objective 8.2)
    Working with ObjectOutputStream and ObjectInputStream
    Object Graphs
    Using writeObject and readObject
    How Inheritance Affects Serialization
    Serialization Is Not for Statics
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    6 Generics and Collections
    Override hashCode(), equals(), and toString() (OCP Objective 1.4)
    The toString() Method
    Overriding equals()
    Overriding hashCode()
    Collections Overview (OCP Objective 3.2)
    So What Do You Do with a Collection?
    Key Interfaces and Classes of the Collections Framework
    List Interface
    Set Interface
    Map Interface
    Queue Interface

    oracle certified professional java se 8 programmer exam 1z0-809 pdf

    Using Collections (OCP Objectives 2.6, 3.2, and 3.3)
    ArrayList Basics
    Autoboxing with Collections
    The Java 7 “Diamond” Syntax
    Sorting Collections and Arrays
    Navigating (Searching) TreeSets and TreeMaps
    Other Navigation Methods
    Backed Collections
    Using the PriorityQueue Class and the Deque Interface
    Method Overview for Arrays and Collections
    Method Overview for List, Set, Map, and Queue
    Generic Types (OCP Objective 3.1)
    The Legacy Way to Do Collections
    Generics and Legacy Code
    Mixing Generic and Nongeneric Collections
    Polymorphism and Generics
    Generic Methods
    Generic Declarations
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    7 Inner Classes
    Nested Classes (OCP Objective 2.3)
    Inner Classes
    Coding a “Regular” Inner Class
    Referencing the Inner or Outer Instance from Within the Inner Class
    Method-Local Inner Classes
    What a Method-Local Inner Object Can and Can’t Do
    Anonymous Inner Classes
    Plain-Old Anonymous Inner Classes, Flavor One
    Plain-Old Anonymous Inner Classes, Flavor Two
    Argument-Defined Anonymous Inner Classes
    Static Nested Classes
    Instantiating and Using Static Nested Classes
    Lambda Expressions as Inner Classes (OCP Objective 2.6)
    Comparator Is a Functional Interface
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers

    oca java se 8 programmer i exam guide (exams 1z0-808)

    8 Lambda Expressions and Functional Interfaces
    Lambda Expression Syntax (OCP Objective 2.6)
    Passing Lambda Expressions to Methods
    Accessing Variables from Lambda Expressions
    Functional Interfaces (OCP Objectives 3.5, 4.1, 4.2, 4.3, and 4.4)
    Built-in Functional Interfaces
    What Makes an Interface Functional?
    Categories of Functional Interfaces
    Method References (OCP Objective 3.8)
    Kinds of Method References
    Write Your Own Functional Interface
    Functional Interface Overview
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    9 Streams
    What Is a Stream? (OCP Objective 3.4)
    How to Create a Stream (OCP Objectives 3.5 and 9.3)
    Create a Stream from a Collection
    Build a Stream with Stream.of()
    Create a Stream from an Array
    Create a Stream from a File
    Primitive Value Streams
    Summary of Methods to Create Streams
    Why Streams?
    The Stream Pipeline (OCP Objective 3.6)
    Streams Are Lazy
    Operating on Streams (OCP Objectives 3.7 and 5.1)
    Map-Filter-Reduce with average() and Optionals (OCP Objectives 5.3 and 5.4)
    Reduce

    Free Download OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809) 2018

    Using reduce()
    Associative Accumulations
    map-filter-reduce Methods
    Optionals (OCP Objective 5.3)
    Searching and Sorting with Streams (OCP Objectives 5.2 and 5.5)
    Searching to See Whether an Element Exists
    Searching to Find and Return an Object
    Sorting
    Methods to Search and Sort Streams
    Don’t Modify the Source of a Stream
    Collecting Values from Streams (OCP Objectives 3.8, 5.6, and 9.3)
    Using collect() with Files.lines()
    Exercise 9-1: Collecting Items in a List
    Grouping and Partitioning
    Summing and Averaging
    Counting, joining, maxBy, and minBy
    Stream Methods to Collect and Their Collectors
    Streams of Streams (OCP Objective 5.7)
    Generating Streams (OCP Objective 3.4)
    Methods to Generate Streams
    Caveat Time Again
    A Taste of Parallel Streams
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    Exercise Answer

    Free Download OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809) 7th Edition

    10 Threads
    Defining, Instantiating, and Starting Threads (OCP Objective 10.1)
    Making a Thread
    Defining a Thread
    Instantiating a Thread
    Starting a Thread
    Thread States and Transitions
    Thread States
    Preventing Thread Execution
    Sleeping
    Exercise 10-1: Creating a Thread and Putting It to Sleep
    Thread Priorities and yield( )
    Synchronizing Code, Thread Problems (OCP Objectives 10.2 and 10.3)
    Preventing the Account Overdraw
    Synchronization and Locks
    Exercise 10-2: Synchronizing a Block of Code
    Thread Deadlock
    Thread Livelock
    Thread Starvation
    Race Conditions
    Thread Interaction (OCP Objectives 10.2 and 10.3)
    Using notifyAll( ) When Many Threads May Be Waiting
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    Exercise Answers

    Free Download OCP Java SE 8 Programmer II Exam Guide

    11 Concurrency
    Concurrency with the java.util.concurrent Package
    Apply Atomic Variables and Locks (OCP Objective 10.3)
    Atomic Variables
    Locks
    Use java.util.concurrent Collections (OCP Objective 10.4)
    Copy-on-Write Collections
    Concurrent Collections
    Blocking Queues
    Controlling Threads with CyclicBarrier
    Use Executors and ThreadPools (OCP Objective 10.1)
    Identifying Parallel Tasks
    How Many Threads Can You Run?
    CPU-Intensive vs. I/O-Intensive Tasks
    Fighting for a Turn
    Decoupling Tasks from Threads
    Use the Parallel Fork/Join Framework (OCP Objective 10.5)
    Divide and Conquer
    ForkJoinPool
    ForkJoinTask
    Parallel Streams (OCP Objective 10.6)
    How to Make a Parallel Stream Pipeline
    Embarrassingly Parallel, Take Two (with Parallel Streams)
    A Parallel Stream Implementation of a RecursiveTask
    Reducing Parallel Streams with reduce()
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    12 JDBC

    Download PDF OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809) 7th Edition

    Starting Out: Introduction to Databases and JDBC
    Talking to a Database
    Bob’s Books, Our Test Database
    Core Interfaces of the JDBC API (OCP Objective 11.1)
    Connect to a Database Using DriverManager (OCP Objective 11.2)
    The DriverManager Class
    The JDBC URL
    JDBC Driver Implementation Versions
    Submit Queries and Read Results from the Database (OCP Objective 11.3)
    All of Bob’s Customers
    Statements
    ResultSets
    When Things Go Wrong—Exceptions and Warnings
    Certification Summary
    Two-Minute Drill
    Q&A Self Test
    Self Test Answers
    A About the Online Content
    McGraw-Hill Professional Media Center Download
    Total Tester Online System Requirements
    Single User License Terms and Conditions
    Total Tester Online
    Technical Support
    Index

  • خرید کتاب زبان اصلی رشته مهندسی کامپیوتر

    خرید کتاب زبان اصلی رشته مهندسی کامپیوتر

    خرید کتاب لاتین رشته مهندسی کامپیوتر Computer Engineering

    سایت دانلود کتاب ایبوک گیگاپیپر یک از بزرگ‌ترین سایت‌های خرید کتاب از امازون ، گوگل بوکز و همچنین دانلود ایبوک از انتشارات گوناگون است.(خرید کتاب از انتشارات اشپرینگر , دانلود ایبوک انتشارات اسپرینگر , فروش کتابهای انتشارات مک گراهیل, دریافت کتب انتشارات مک گروهیل , خرید PDF کتابهای وایلی , فروش ایبوکهای انتشارات جان وایلی , دانلود کتاب های جان وایلی  و در یک کلام فروش کتاب های لاتین خارجی , کتابهای تخصصی و مقالات علمی است)
    در کتابخانه مجازی گیگاپیپر بیش از 6 ملیون کتاب الکترونیکی از کلیه ناشرین موجود است. ایبوکها اکثرا به فرمت PDF , EPUB , AZW است که همگی به زبان اصلی است.

    ایبوک رشته مهندسی کامپیوتر Computer Engineering غیر موجود در لیست خرید کتاب لاتین خرید کتاب زبان اصلی خرید کتاب لاتین کتاب خارجی افست خرید کتاب علمی خارجی
    ایبوک رشته مهندسی کامپیوتر Computer Engineering غیر موجود در لیست خرید کتاب لاتین خرید کتاب زبان اصلی خرید کتاب لاتین کتاب خارجی افست خرید کتاب علمی خارجی

    درخواست ایبوک رشته مهندسی کامپیوتر Computer Engineering غیر موجود در لیست

    لیست برخی از کتاب های رشته  مهندسی  کامپیوتر Computer Engineering در زیر فراهم شده است. درصورتی که کتاب خارجی مورد نظر شما در این لیست نیست، می توانید مشخصات کتاب را برای ما ارسال کنید تا در کمتر از چند ساعت ایبوک ان برای شما فراهم می شود. راههای ارتباطی در قسمت تماس با ما می باشد.

    لیست  کتاب های زبان اصلی رشته مهندسی کامپیوتر Computer Engineering

    Discipline/Subject Title Author Publication Date Abstract/Summary
    Computer Engineering/Embedded Systems and Programming BeagleBone Robotic Projects – Second Edition  

    خرید کتاب اورجینال

    6/13/2017 Exciting new capabilities to enable even easier DIY robotics with BeagleBone Blue About This Book • Build powerful robots with the all new BeagleBone Blue • Communicate with your robot and teach it to detect and respond to its environment • Control walking, rolling, swimming, and flying robots with your iOS and Android mobile devices Who This Book Is For This book is for anyone who is curious about using new, low-cost hardware to create robotic projects and have previously been the domain of research labs, major universities, or defence departments.
    Computer Engineering/Digital Communications and Networking HSDPA/HSUPA for UMTS: High Speed Radio Access for Mobile Communications   Harri Holma
    Antti Toskala
    5/1/2016 From the editors of the highly successful WCDMA for UMTS, this new book provides a comprehensive and up-to-date reference to High Speed Packet Access (HSPA) technologies for WCDMA.The editors cover both HSDPA and HSUPA, including an in-depth description and explanation of 3GPP standards, and expected performance based on simulations and first measurements.
    Computer Engineering/Digital Communications and Networking LTE Signaling: Troubleshooting and Performance Measurement – 2nd Edition   Ralf Kreher
    Karsten Gaenger
    1/1/2016 This extensively updated second edition of LTE Signaling, Troubleshooting and Performance Measurement describes the LTE signaling protocols and procedures for the third generation of mobile communications and beyond.It is one of the few books available that explain the LTE signaling messages, procedures and measurements down to the bit & byte level, and all trace examples are taken for a real lab and field trial traces.
    Computer Engineering/Digital Communications and Networking LTE Small Cell Optimization: 3GPP Evolution to Release 13

    خرید کتاب لاتین

    Harri Holma
    Antti Toskala
    Jussi Reunanen
    1/1/2016 LTE network capabilities are enhanced with small cell deployment, with optimization and with new 3GPP features.LTE networks are getting high loaded which calls for more advanced optimization.Small cells have been discussed in the communications industry for many years, but their true deployment is happening now.New 3GPP features in Release 12 and 13 further push LTE network performance.
    Computer Engineering/Digital Communications and Networking The LTE-Advanced Deployment Handbook: The Planning Guidelines for the Fourth Generation Networks   Jyrki T. J. Penttinen 1/1/2016 LTE-Advanced is the new Global standard which is expected to create a foundation for the future wireless broadband services.The standard incorporates all the latest technologies recently developed in the field of wireless communications.Presented in a modular style, the book provides an introductory description for beginners as well as practical guidelines for telecom specialists.
    Computer Engineering/Digital Communications and Networking Green Communications: Principles, Concepts and Practice   Konstantinos Samdanis
    Peter Rost
    Andreas Maeder
    Michela Meo
    Christos Verikoukis
    9/1/2015 This book provides a comprehensive view of green communications considering all areas of ICT including wireless and wired networks.It analyses particular concepts and practices, addressing holistic approaches in future networks considering a system perspective.It makes full use of tables, illustrations, performance graphs, case studies and examples making it accessible for a wide audience.
    Computer Engineering/Digital Communications and Networking Collaborative Internet of Things (C-IoT): for Future Smart Connected Life and Business   Fawzi Behmann
    Kwok Wu
    6/1/2015 This book provides a simplified visionary approach about the future direction of IoT, addressing its wide-scale adoption in many markets, its interception with advanced technology, the explosive growth in data, and the emergence of data analytics.IoT business applications span multiple vertical markets.The objective is to inspire creative thinking and collaboration among startups and entrepreneurs which will breed innovation and deliver IoT solutions that will positively impact us by making business processes more efficient, and improving our quality of life.
    Computer Engineering/General Computer Engineering Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis   Tony UcedaVelez
    Marco M. Morana
    5/1/2015 This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology.It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.
    Computer Engineering/General Computer Engineering Chinese Cybersecurity and Defense   Daniel Ventre 4/1/2015 Cyberdefense has become, over the past five years, a major issue on the international scene.China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity.The United States is building their cyberdefense strategy against what they call the “Chinese threat.”
    Computer Engineering/Digital Communications and Networking Assessing Information Security: Strategies, tactics, logic and framework – 2nd Edition  

    خرید کتاب لاتین

    1/29/2015 If anything, accelerated technological developments such as expansion of cloud networks, application services, business use of BYOD (Bring Your Own Device) and BYOA (Bring Your Own Application), together with all kinds of interconnected mobile devices, have only strengthened the strategies we have elaborated by forcing downstream security tactics to be more aligned with them. It can be consulted when you need an independent security assessment, or want to set up an internal audit team, or review your vendors’ or partner companies’ levels of security, or even run your own information security services business. Andrew has an extensive background in performing information security assessments, ranging from external and internal penetration tests, to configuration, security policies, processes and procedures reviews. On accomplishing his MBA, he co-founded information security company, Arhont Ltd, participated in security research, published articles and advisories, and greatly contributed to the overall success of the Arhont team. As a security consultancy, we are not at other information security companies’ throats.
    Computer Engineering/Digital Communications and Networking LTE Standards   Jean-Gabriel Remy
    Charlotte Letamendia
    11/1/2014 LTE (long-term evolution) mobile communication system is offering high bitrates in IP communications.Fourth Generation Mobile Communications/LTE describes various aspects of LTE as well as the change of paradigm, which it is bringing to mobile communications.The book is a vital resource for the entire mobile communication community.Coverage includes: LTE standards and architecture, Radio access sub-system, Signaling on the radio path, Macrocells, microcells, femtocells, SIM card and security, SIM card description, GPS driven applications, The Apple model, and much more more.
    Computer Engineering/Digital Communications and Networking BeagleBone for Secret Agents   9/23/2014 If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security and privacy, this book is for you.Alternatively, if you have a security and privacy background and want to learn more about embedded development, this book is for you.You should have some familiarity with Linux systems and with the C and Python programming languages.
    Computer Engineering/Digital Communications and Networking From GSM to LTE-Advanced: An Introduction to Mobile Networks and Mobile Broadband – Second Edition   Martin Sauter 9/1/2014 This revised edition of Communication Systems from GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband Second Edition (Wiley 2010) contains not only a technical description of the different wireless systems available today, but also explains the rationale behind the different mechanisms and implementations; not only the ‘how’ but also the ‘why’.
    Computer Engineering/Digital Communications and Networking HSPA+ Evolution to Release 12  

    خرید کتاب اورجینال

    Harri Holma
    Antti Toskala
    Pablo Tapia
    9/1/2014 A comprehensive reference book codifying the various standards releases for High Speed Packet Access (HSPA) wireless technology HSPA evolution has maintained its prominence through Releases 7-11 but the evolution is coming to an end with Release 12, with the focus moving to LTE.However, HSPA network and terminal sales will continue for many years: HSPA is expected to remain as the number one radio access technology from the sales point of view far beyond 2015.
    Computer Engineering/Embedded Systems and Programming Building Multicopter Video Drones   8/26/2014 This book is for a wide range of individuals who are looking to shoot aerial footage with a multicopter.No previous flying experience is assumed, but even the most expert flyers will find unexpected and interesting information.
    Computer Engineering/Digital Communications and Networking Arduino Networking   8/21/2014 This book is intended for those who want to build their own network-connected projects using the Arduino platform.You will be able to build exciting projects that connect to your local network and the Web.You will need to have some basic experience in electronics and web programming languages.You will also need to know the basics of the Arduino platform as the projects mainly deal with the networking aspects of the Arduino Ethernet shield.
    Computer Engineering/Embedded Systems and Programming Arduino Robotic Projects   8/14/2014 This book is for anyone who has been curious about using Arduino to create robotic projects that were previously the domain of research labs of major universities or defense departments.Some programming background is useful, but if you know how to use a PC, you can, with the aid of the step-by-step instructions in this book, construct complex robotic projects that can roll, walk, swim, or fly.
    Computer Engineering Arduino Home Automation Projects   7/23/2014 This book is divided into projects that are explained in a step-by-step format, with practical instructions that are easy to follow.If you want to build your own home automation systems wirelessly using the Arduino platform, this is the book for you.You will need to have some basic experience in Arduino and general programming languages, such as C and C++ to understand the projects in this book.
    Computer Engineering/Embedded Systems and Programming Embedded Linux Development with Yocto Project   7/9/2014 A practical tutorial guide which introduces you to the basics of Yocto Project, and also helps you with its real hardware use to boost your Embedded Linux-based project.If you are an embedded systems enthusiast and willing to learn about compelling features offered by the Yocto Project, then this book is for you.With prior experience in the embedded Linux domain, you can make the most of this book to efficiently create custom Linux-based systems.
    Computer Engineering/Digital Communications and Networking An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications – 2nd Edition   Christopher Cox 7/1/2014 Following on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works.The content is expressed at a systems level, offering readers the opportunity to grasp the key factors that make LTE the hot topic amongst vendors and operators across the globe.The book assumes no more than a basic knowledge of mobile telecommunication systems, and the reader is not expected to have any previous knowledge of the complex mathematical operations that underpin LTE.
    Computer Engineering/General Computer Engineering Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks   MacDonnell Ulsch 7/1/2014 Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat!How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity.Written by one of the nation’s most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences.
    Computer Engineering/General Computer Engineering Cybersecurity for Executives: A Practical Guide   Gregory J. Touhill
    C. Joseph Touhill
    7/1/2014 Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers ‘What to Do When You Get Hacked?’ including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information
    Computer Engineering/Embedded Systems and Programming Internet of Things with the Arduino Yún  

    خرید کتاب لاتین

    5/21/2014 All projects are explained in a stepbystep manner, always starting with the assembly of the hardware and followed by basic tests of every hardware component.You will then learn how to build exciting applications in a practical manner based on the details of the projects.This book is intended for people who already have some experience with the Arduino platform and who want to build more exciting applications, in particular to Internet of Things.
    Computer Engineering/General Computer Engineering Dictionary of Computer Vision and Image Processing – 2nd Edition   Robert B. Fisher
    Toby P. Breckon
    Kenneth Dawson-Howe
    Andrew Fitzgibbon
    Craig Robertson
    Emanuele Trucco
    Christopher K. I. Williams
    1/1/2014 Written by leading researchers, the 2nd Edition of the Dictionary of Computer Vision & Image Processing is a comprehensive and reliable resource which now provides explanations of over 3500 of the most commonly used terms across image processing, computer vision and related fields including machine vision.It offers clear and concise definitions with short examples or mathematical precision where necessary for clarity that ultimately makes it a very usable reference for new entrants to these fields at senior undergraduate and graduate level, through to early career researchers to help build up knowledge of key concepts.
    Computer Engineering/Embedded Systems and Programming BeagleBone Robotic Projects   12/26/2013 Develop practical example projects with detailed explanations; combine the projects in a vast number of ways to create different robot designs, or work through them in sequence to discover the full capability of the BeagleBone Black.This book is for anyone who is curious about using new, low-cost hardware to create robotic projects that have previously been the domain of research labs, major universities or Defence departments.
    Computer Engineering BeagleBone Home Automation   12/24/2013 An easy-to-follow guide full of hands-on examples to help  transform your house into a standalone home automation solution.If  you are looking for ways to create a highly capable home automation  system that is easily extendable and highly configurable, then this  book is for you.Basic knowledge of electronics and programming in  Python and/or Java languages will be helpful, but not  mandatory.
    Computer Engineering Building a Home Security System with BeagleBone   12/17/2013 Building a Home Security System with BeagleBone is a practical, hands-on guide for practical, hands-on people.The book includes step-by-step instructions for assembling your own hardware on professionally manufactured PCB’s and setting up the software on your system.This book is for anyone who is interested in alarm systems and how they work; for hobbyists and basement tinkerers who love to build things.
    Computer Engineering/Embedded Systems and Programming Instant Optimizing Embedded Systems using Busybox   11/25/2013 Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks.A step-by-step guide which provides concise and clear recipes for getting started with Busybox.If you are an embedded system developer or Android developer who wishes to learn to build an embedded (Android Linux) system from scratch, as well as to optimize the system performance, then this book will be great for you.
    Computer Engineering/Digital Communications and Networking An Introduction to Information Security and ISO27001:2013 – A Pocket Guide – 2nd Edition   10/3/2013 Written by an acknowledged expert on the new ISO27001 standard, An Introduction to information security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security.It will ensure the systems you put in place are effective, reliable and auditable.This pocket guide will help you to: Make informed decisions, use this guide will enable the key people in your organisation to make better decisions before embarking on an information security project, Ensure everyone is up to speed, Use this guide to give the non-specialists on the project board and in the project team a clearer understanding of what the project involves, Raise awareness among staff, Use this guide to make sure your people know what is at stake with regard to information security and understand what is expected of them, Enhance your competitiveness, Use this guide to let your customers know that the information you hold about them is managed and protected appropriately.
    Computer Engineering/Embedded Systems and Programming Instant Buildroot  

    خرید کتاب اورجینال

    9/25/2013 Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks.A concise guide full of step-by-step recipes to help you learn how to generate and configure an embedded Linux system using Buildroot.Instant Buildroot is for developers who want to know how to use Buildroot tools to generate and configure their own embedded system.
    Computer Engineering/Embedded Systems and Programming Instant LEGO MINDSTORMS EV3   9/25/2013 Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks.A concise guide full of step-by-step recipes to teach you how to build and program an advanced robot.”Instant LEGO Mindstorm EV3″ is for both the adult tinkerer who has never touched LEGO before and the experienced LEGO engineer who has evolved from Mindstorm NXT to EV3.
    Computer Engineering/General Computer Engineering The True Cost of Information Security Breaches and Cyber Crime   7/16/2013 Most businesses are now aware of the importance of information security.However, some organisations struggle to understand what an information security breach would mean from a business management point of view.This can lead to organisations investing in expensive solutions which may not necessarily address their requirements.This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face.
    Computer Engineering/Digital Communications and Networking Building the Internet of Things with IPv6 and MIPv6: The Evolving World of M2M Communications   Daniel Minoli 7/1/2013 “If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss, and cost.We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best.The Internet of Things has the potential to change the world, just as the Internet did.
    Computer Engineering/Embedded Systems and Programming Instant OpenELEC Starter   6/3/2013 Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.A tangible and easy-to-follow guide on installation and basic configuration of a home media center, allowing for the completion of the process without having to look elsewhere for additional information, and within a relatively limited timespan.
    Computer Engineering/Embedded Systems and Programming C Programming for Arduino   5/17/2013 Written as a practical Packt book brimming with engaging examples, C Programming for Arduino will help those new to the amazing open source electronic platform so that they can start developing some great projects from the very start.This book is great for people who want to learn how to design & build their own electronic devices.From interaction design art school students to the do-it-yourself hobbyist, or even simply people who want to learn electronics, this book will help by adding a new way to design autonomous but connected devices.
    Computer Engineering/General Computer Engineering Turning Heads and Changing Minds – Transcending IT Auditor Archetypes   3/7/2013 Turning Heads and Changing Minds provides the IT auditor (student or practitioner) with an understanding of soft skills.It takes a hard look at common auditor perceptions that can hinder an audit and offers practical techniques for overcoming them.Rather than issue a list of ‘should dos’, the book offers the reader an intuitive, organic approach, with real-life IT scenarios involving general computer, application and third-party controls at various stages of an audit life cycle.
    Computer Engineering/Digital Communications and Networking 3G, 4G and Beyond: Bringing Networks, Devices and the Web Together – 2nd Edition   2013 Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile terminalsdevices, voice and multimedia services and the mobile web 2.0.Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.
    Computer Engineering/Digital Communications and Networking Cognitive Radio Communication and Networking: Principles and Practice  

    خرید کتاب اورجینال

    2013 A comprehensive examination of the basic mathematical tools,  progressing to more advanced concepts and discussions about the  future of cognitive radio   Cognitive radio is a paradigm for wireless communication  in which either a network or a wireless node changes its  transmission or reception parameters to communicate efficiently  avoiding interference with licensed or unlicensed users.
    Computer Engineering/Embedded Systems and Programming Embedded Systems: Hardware Design and Implementation   2013 Covers the significant embedded computing  technologies—highlighting their applications in wireless  communication and computing power  An embedded system is a computer system designed for specific  control functions within a larger system—often with real-time  computing constraints.It is embedded as part of a complete device  often including hardware and mechanical parts.
    Computer Engineering Safety Management of Software-based Equipment   2013 Systems based on programmable electronics are being used  increasingly and can make the tackling of safety even more  challenging.Electronics is characterized by faults, referred to as  random, that can appear at any time, but can be predicted with  probabilities  these are systematic faults (design, errors,  misunderstandings, software faults, etc.).
    Computer Engineering/Digital Communications and Networking Understanding LTE with MATLAB: From Mathematical Modeling to Simulation and Prototyping   2013 An introduction to technical details related to the Physical  Layer of the LTE standard with MATLAB  The LTE (Long Term Evolution) and LTE-Advanced are among the  latest mobile communications standards, designed to realize the  dream of a truly global, fast, all-IP-based, secure broadband  mobile access technology.This book examines the Physical Layer (PHY) of the LTE standards  by incorporating three conceptual elements: an overview of the  theory behind key enabling technologies; a concise discussion  regarding standard specifications; and the MATLAB algorithms  needed to simulate the standard.
    Computer Engineering/Digital Communications and Networking LTE Security – 2nd Edition   Dan Forsberg
    Gunther Horn
    Wolf-Dietrich Moeller
    Valtteri Niemi
    12/1/2012 A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE Security addressing the security architecture for SAE/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems.
    Computer Engineering/General Computer Engineering The Quantum Age of IT – Why everything you know about IT is about to change  

    خرید کتاب لاتین

    11/29/2012 In The Quantum Age of IT, Charles Araujo examines what has led us to this point and what it means to the future of IT organisations.With a broad perspective on the fundamental changes affecting the industry, he offers practical guidance that every IT professional needs to compete in this new era of IT.Whether you are an IT executive, or just beginning your career, this book will offer you the key insights you need to understand what is happening and what is coming.
    Computer Engineering/Digital Communications and Networking LTE Advanced: 3GPP Solution for IMT-Advanced   Harri Holma
    Antti Toskala
    10/1/2012 From the editors of the highly successful LTE for UMTS: Evolution to LTE-Advanced, this new book examines the main technical enhancements brought by LTE-Advanced, thoroughly covering 3GPP Release 10 specifications and the main items in Release 11.Using illustrations, graphs and real-life scenarios, the authors systematically lead readers through this cutting-edge topic to provide an outlook on existing technologies as well as possible future developments.
    Computer Engineering/Digital Communications and Networking Securing Cloud Services – A pragmatic approach to security architecture in the Cloud   7/24/2012 This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.Part 1 introduces Cloud Computing and describes the main service models (IaaS, PaaS and SaaS) and deployment models (public, private, community and hybrid) as defined by NIST.
    Computer Engineering/Digital Communications and Networking Smart Technologies for Communication   6/28/2012 The conference, of which these are the proceedings, was intended to bring together researchers and engineers/technologists working on diverse aspects of materials, mechanics, electronics, computers, communications and other topics.The peer-reviewed papers are grouped into chapters on: Computer Networks and Communication Engineering; Machinery, Electrical and Electronic Equipment, Technology; Computer Theory, Software and Computer Technologies; Signal Processing.
    Computer Engineering/Digital Communications and Networking Penetration Testing – Protecting Networks and Systems   6/21/2012 This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization’s computer systems.Key areas covered include: The primary phases of pen testing – reconnaissance, enumeration, vulnerability assessment and the eventual launch of an attack, The preparation of the test report – what information to include in the report and how best to present it to the client, The introduction of new technology ­- how it can improve business operations (e.g. employee remote access, wireless communications, public-facing web applications), but, at the same time, create new vulnerabilities.
    Computer Engineering/Embedded Systems and Programming Embedded SoPC Design with Nios II Processor and Verilog Examples  

    خرید کتاب اورجینال

    مه, 2012 Explores the unique hardware programmability of FPGA-based  embedded systems, using a learn-by-doing approach to introduce the  concepts and techniques for embedded SoPC design with Verilog  An SoPC (system on a programmable chip) integrates a processor,  memory modules, I/O peripherals, and custom hardware accelerators  into a single FPGA (field-programmable gate array) device.
    Computer Engineering/Digital Communications and Networking Cloud Computing – Assessing the risks   4/17/2012 Cloud Computing: Assessing the risks answers these questions and many more.Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.Written by three internationally renowned experts, this book discusses the primary concerns of most businesses leaders – the security and risk elements of the Cloud.
    Computer Engineering/General Computer Engineering Cyber Security Policy Guidebook   Jennifer L. Bayuk
    Jason Healey
    Paul Rohmeyer
    Marcus H. Sachs
    Jeffrey Schmidt
    Joseph Weiss
    4/1/2012 Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace.It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone.
    Computer Engineering/Digital Communications and Networking 21st Century Chinese Cyberwarfare   3/5/2012 21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical and linguistic sources, as well as the author’s personal experience, to attempt to explain China to the uninitiated.The objective of the book is to present the salient information regarding the use of cyber warfare doctrine by the People’s Republic of China to promote its own interests and enforce its political, military and economic will on other nation states.
    Computer Engineering/Digital Communications and Networking The Internet of Things: Key Applications and Protocols – 2nd Edition   Olivier Hersent
    David Boswarthick
    Omar Elloumi
    2/1/2012 An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard.In-depth coverage of Smart-grid and EV charging use cases.This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M.
    Computer Engineering/Digital Communications and Networking An Introduction to Hacking and Crimeware – A Pocket Guide   1/19/2012 An Introduction to Hacking Crimeware is a comprehensive guide to the more serious threats.Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.In this pocket guide, the author: defines exactly what crimeware is – both intentional and unintentional – and gives specific, up-to-date examples to help you identify the risks and protect your business, explores the increasing use of COTS tools as hacking tools, exposing the enemy’s tactics gives practical suggestions as to how you can fight back, provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business.
    Computer Engineering/General Computer Engineering The ITSM Iron Triangle – Incidents, changes and problems   1/5/2012 This innovative work of fiction demonstrates how ITIL® best practice can ensure the success of your IT process implementation projects.It is based on real-life, up-to-date situations and offers vital strategies to implement the most important aspects of ITIL into your business and to tailor them to your organisation’s particular needs.
    Computer Engineering/Digital Communications and Networking Networks and Services: Carrier Ethernet PBT MPLS-TP and VPLS  

    خرید کتاب اورجینال

    2012 This book provides a comprehensive understanding of current and  debated future networking technologies.It gives insight into  building end-to-end networks and services with Carrier Ethernet,  PBT, MPLS-TP, and VPLS while also shedding light on the pros and  cons of these technologies for service providers and enterprise  network owners.Focusing on layer-2 networking and services, Networks and  Services covers:    The basics of Ethernet such as protocol stack, bridges,  switches, and hubs  Key techniques that are being used in building carrier-class  Carrier Ethernet networks and services like synchronization,  pseudowires, and protection  Carrier Ethernet network architectures and services that are  currently deployed in the industry  Traffic management and OAM capabilities of Carrier  Ethernet  Circuit Emulation Services  PBB and PBT to resolve possible scalability issues of Carrier  Ethernet  Technologies that are competing or working with Carrier  Ethernet in forming data networks and services, Transport MPLS,  MPLS Transport Profile, and VPLS    Networks and Services: Carrier Ethernet, PBT, MPLS-TP, and  VPLS is ideal for network architects, engineers, and planning  professionals in telecommunications, as well as students and  researchers in related disciplines.
    Computer Engineering/Digital Communications and Networking Voice over LTE (VoLTE)   2012 Describes the technological solutions and standards which will  enable the migration of voice and SMS services over to LTE/EPC  networks   Main drivers for the introduction of Long Term Evolution of  UTRAN (LTE) is to provide far better end user experience for mobile  broadband services.However, service providers also need to have a  clear strategy of how to offer voice and messaging services for  consumers and enterprises.
    Computer Engineering/General Computer Engineering RFID and the Internet of Things   Harvé Chabanne
    Pascal Urien
    Jean-Ferdinand Susini
    6/1/2011 RFID (Radio Frequency Identification) technology allows for automatic identification of information contained in a tag by scanning and interrogation using radio frequency (RF) waves.An RFID tag contains an antenna and a microchip that allows it to transmit and receive.This technology is a possible alternative to the use of barcodes, which are frequently inadequate in the face of rapid growth in the scale and complexity of just-in-time inventory requirements, regional and international trade, and emerging new methods of trade based on it.
    Computer Engineering/General Computer Engineering The Chief Information Security Officer – Insights, tools and survival skills   5/5/2011 The CISO has overall responsibility for corporate security strategy, but today’s CISO has to be in the business of managing information, not just securing it.The successful CISO needs to have excellent communication and presentation skills, and to demonstrate keen business acumen.The serious and ever-changing nature of today’s security threats demand a strategic-minded response, and a successful CISO will always be thinking about how to gain business objectives through enabling technology while properly managing risk.
    Computer Engineering/Digital Communications and Networking LTE for UMTS: Evolution to LTE-Advanced – 2nd Edition   4/1/2011 Written by experts actively involved in the 3GPP standards and product development, LTE for UMTS, Second Edition gives a complete and up-to-date overview of Long Term Evolution (LTE) in a systematic and clear manner.Building upon on the success of the first edition, LTE for UMTS, Second Edition has been revised to now contain improved coverage of the Release 8 LTE details, including field performance results, transport network, self optimized networks and also covering the enhancements done in 3GPP Release 9.
    Computer Engineering/Digital Communications and Networking Cooperative Networking   2011 This book focuses on the latest trends and research results in  Cooperative Networking   This book discusses the issues involved in cooperative  networking, namely, bottleneck resource management, resource  utilization, servers and content, security, and so on.In addition,  the authors address instances of cooperation in nature which  actively encourage the development of cooperation in  telecommunication networks.
    Computer Engineering/Digital Communications and Networking The Handbook of MPEG Applications: Standards in Practice  

    خرید کتاب اورجینال

    Marios C. Angelides
    Harry Agius
    12/1/2010 This book provides a comprehensive examination of the use of MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A standards, providing a detailed reference to their application.In this book, the authors address five leading MPEG standards: MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A, focusing not only on the standards themselves, but specifically upon their application (e.g. for broadcasting media, personalised advertising and news, multimedia collaboration, digital rights management, resource adaptation, digital home systems, and so on); including MPEG cross-breed applications.
    Computer Engineering/Digital Communications and Networking Email Security – A Pocket Guide   11/30/2010 Your business relies on e-mail for its everyday dealings with partners, suppliers and customers.While e-mail is an invaluable form of communication, it also represents a potential threat to your information security.E-mail could become the means for criminals to install a virus or malicious software on your computer system and fraudsters will try to use e-mails to obtain sensitive information through phishing scams.
    Computer Engineering/Digital Communications and Networking Cloud Security and Governance – Who’s on your cloud?   10/21/2010 The rise of Cloud Computing, with services delivered “in the cloud”, offers businesses incredible power and flexibility.It promises the efficient use of human and financial capital resources, reducing infrastructure and operation costs.It proposes a model of computing that is effective at meeting the demands of business in a rapidly changing environment
    Computer Engineering/Digital Communications and Networking WCDMA for UMTS: HSPA Evolution and LTE – 5th Edition   9/1/2010 Now in its fifth edition, the bestselling book on UMTS has been updated to cover 3GPP WCDMA and High Speed Packet Access (HSPA) from Release 99 to Release 9.Written by leading experts in the field, the book explains HSPA performance based on simulations and field experience, and illustrates the benefits of HSPA evolution (HSPA+) both from the operators and from the end user?s perspective.
    Computer Engineering/Digital Communications and Networking Information Security Risk Management for ISO27001/ISO27002  

    خرید کتاب لاتین

    4/27/2010 The requirements for an ISMS are specified in ISO27001.Under ISO27001, a risk assessment has to be carried out before any controls can be selected and implemented, making risk assessment the core competence of information security management.This book provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO27001.
    Computer Engineering/Digital Communications and Networking Data Protection Compliance in the UK – A Pocket Guide – 2nd Edition   4/6/2010 Data Protection Compliance in the UK has been published to be an easy-read introduction for any employee required to support compliance with the DPA.This concise book covers: UK and EU data protection regulations, The rights of individuals, The security obligations of organisation, Key definitions, terms and requirements, Practical compliance check-lists, covering the steps you must take to reach DPA compliance, Additional topics including IT monitoring and interception, enforcement provisions and penalties for non-compliance.
    Computer Engineering/Digital Communications and Networking Assessing Information Security – Strategies, Tactics, Logic and Framework   3/4/2010 Assessing Information Security deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours.It will give you the founding principles around information security assessments and why they are important.The book provides a fluid framework for developing an astute ‘information security mind’ capable of rapid adaptation to evolving technologies, markets, regulations, laws, and so on.
    Computer Engineering/Digital Communications and Networking Cyber Risks for Business Professionals – A Management Guide   1/8/2010 Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing suitable strategies for their management.It provides a breakdown of the main risks involved and shows you how to manage them.Covering the relevant legislation on information security and data protection, the author combines his legal expertise with a solid, practical grasp of the latest developments in IT to offer a comprehensive overview of a highly complex subject.
    Computer Engineering/Embedded Systems and Programming Advances in Cognitive Systems   S. Nefti
    J. O. Gray
    2010 The book has 17 chapters and deals with the following subjects: cognitive robotics system; adaptive systems; dynamical enactive cognitive architecture; cooperative decision model; virtual humans; neurocomputational cognitive architectures; robotic agents; neural networks; investor behavior; swarm intelligence techniques and distributive cognition.
    Computer Engineering/Digital Communications and Networking LTE – The UMTS Long Term Evolution: From Theory to Practice – 2nd Edition  

    خرید کتاب اورجینال

    2010 Where this book is exceptional is that the reader will  learn not just how LTE works but why it works.Adrian  Scrase, ETSI Vice-President, International Partnership Projects   The first edition of this book is globally recognized as the  ultimate reference book on LTE.Following the success of it  predecessor, this second edition is fully updated, covering the  latest additions to LTE and a full description of  LTE-Advanced.
    Computer Engineering/General Computer Engineering Random Data: Analysis and Measurement Procedures – 4th Edition   2010 A timely update of the classic book on the theory and  application of random data analysis   First published in 1971, Random Data served as an  authoritative book on the analysis of experimental physical data  for engineering and scientific applications.This Fourth  Edition features coverage of new developments in random data  management and analysis procedures that are applicable to a broad  range of applied fields, from the aerospace and automotive  industries to oceanographic and biomedical research.
    Computer Engineering/Embedded Systems and Programming Smart Card Handbook 4th Edition Complete Document   2010 The most comprehensive book on state-of-the-art smart card  technology available   Updated with new international standards and specifications,  this essential fourth edition now covers all aspects of smart card  in a completely revised structure.Its enlarged coverage now  includes smart cards for passports and ID cards, health care cards,  smart cards for public transport, and Java Card 3.0.
    Computer Engineering/Digital Communications and Networking Wireless Communications – 2nd Edition   2010 “Professor Andreas F. Molisch, renowned researcher and educator,  has put together a comprehensive, clear, and authoritative book on  wireless communications.The Second Edition, which includes a  wealth of new material on important emerging topics, ensures the  book will continue to be a key resource for every student,  researcher, and practitioner in the field.”
    Computer Engineering/Digital Communications and Networking Information Security Breaches – Avoidance and Treatment based on ISO27001   12/9/2009 If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue.This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur.In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001.
    Computer Engineering/Digital Communications and Networking The Definitive Guide to the C&A Transformation Process – The First Publication of a Comprehensive View of the C&A Transformation   10/6/2009 The Definitive Guide to the C&A Transformation provides an authoritative guide to authorization for persons with knowledge of information systems and/or information systems security, but not necessarily the same level of expertise with certification and accreditation (C&A) standards and best practices; it points to references for further knowledge.
    Computer Engineering/Digital Communications and Networking Mobile Security – A Pocket Guide   7/16/2009 This pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone.Written by one of the country’s top academic experts on information security, the guide covers such topics as safeguarding data through encryption, establishing a virtual private network (VPN) to create a secure way for your staff to connect to the server on a remote device, and countering the growing threat on mobile platforms of SMS-phishing and malware.
    Computer Engineering/General Computer Engineering MOLECULAR REALIZATIONS OF QUANTUM COMPUTING 2007   6/12/2009 This book provides an overview on physical realizations of quantum computing by means of molecular systems.It will be useful for graduate students and researchers interested in quantum computing from different areas of physics, physical chemistry, informatics and computer science.Each chapter is written in a self-contained manner and hence can be accessible for researchers and graduate students with even less background in the topics.
    Computer Engineering/Digital Communications and Networking CyberWar, CyberTerror, CyberCrime – A Guide to the Role of Standards in an Environment of Change and Danger   4/17/2009 CyberWar, CyberTerror, CyberCrime introduces readers to the practical use of standards and best practices to address significant security problems, such as those presented by cyberwar, cyberterror, and cybercrime.It also identifies a body of knowledge essential to acquire, develop, and sustain a secure information environment.This book provides a new context for addressing some of the broader challenges of security.
    Computer Engineering/General Computer Engineering The Insider Threat – Combatting the Enemy Within  

    خرید کتاب اورجینال

    4/7/2009 How exposed is your company to the risk of a malicious attack by a discontented or psychologically unbalanced employee?What precautions have you taken to ensure that your IT systems cannot be manipulated for purposes of insider fraud?What steps do you need to take to prevent your IT systems from falling prey to organized crime through someone who has been planted within your firm or someone who is being threatened or bribed?
    Computer Engineering/Digital Communications and Networking How to Survive a Data Breach – A Pocket Guide   2/17/2009 Data breaches are becoming a fact of life.As companies retain more data on clients, and data collection becomes more centralised, the risk of multiple records going missing increases.If your organisation gets hit by a data breach, then the way you respond will have a huge impact on your ability to recover.For this reason, forward planning is essential.
    Computer Engineering/Digital Communications and Networking Hadamard Transforms   2009 The Hadamard matrix and Hadamard transform are fundamental problem-solving tools in a wide spectrum of scientific disciplines and technologies, such as communication systems, signal and image processing (signal representation, coding, filtering, recognition, and watermarking), digital logic (Boolean function analysis and synthesis), and fault-tolerant system design.
    Computer Engineering/Embedded Systems and Programming Managing the Testing Process: Practical Tools and Techniques for Managing Hardware and Software Testing 3rd Edition  

    خرید کتاب لاتین

    2009 Proven tips and tools for building and executing an effective  test project  Earlier editions of this book have helped test managers around  the world to develop essential tools and apply them to successful  test project management.In this third edition of his bestseller,  Rex Black shares lessons he has learned in the decade since the  first edition came out and provides a thorough review of the latest  tools and resources, making this book even more valuable.
    Computer Engineering/General Computer Engineering Non-Binary Error Control Coding for Wireless Communication and Data Storage   2009 Comprehensive introduction to non-binary error-correction coding  techniques   Non-Binary Error Control Coding for Wireless Communication  and Data Storage explores non-binary coding schemes that have  been developed to provide an alternative to the Reed   Solomon codes, which are expected to become unsuitable for use in  future data storage and communication devices as the demand for  higher data rates increases.
    Computer Engineering/Digital Communications and Networking Transceiver and System Design for Digital Communications   Scott R. Bullock 2009 The book covers the following topics: transceiver design; transmitter; receiver; AGC design and PLL comparison; demodulation; basic probability and pulse theory; multipath; improving the system against jammers; global navigation satellite systems; satellite communications; broadband communications and networking; and direction finding and interferometer analysis.
    Computer Engineering The Governance of Green IT – The Role of Processes in Reducing Data Center Energy Requirements   12/11/2008 This book’s message has nothing to do with greenwash.It is intended for people who are looking for hard, practical advice on how to fix a problem.Green IT needs to establish baseline data so that progress can be effectively tracked, and metrics are essential for that.Taking Green IT seriously also means coming up with a plan and making sure it gets delivered.
    Computer Engineering/Digital Communications and Networking Data Protection vs. Freedom of Information – Access and Personal Data   11/19/2008 Freedom of information is often mentioned in the same breath as data protection.In fact, the legal position is more complicated.Whereas data protection is about protecting individuals, freedom of information is about open government.The Data Protection Act is mainly concerned with the confidentiality and security of information, but the purpose of the Freedom of Information Act is to encourage the disclosure of information.
    Computer Engineering/Digital Communications and Networking Information Security Law – The Emerging Standard for Corporate Compliance  

    خرید کتاب اورجینال

    10/7/2008 Information Security Law: The Emerging Standard for Corporate Compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide.This book takes a high level view of the multitude of security laws and regulations, and summarizes the global legal framework for information security that emerges from them.
    Computer Engineering/Digital Communications and Networking Application security in the ISO27001 Environment   4/10/2008 Application Security in the ISO27001 Environment demonstrates how to secure software applications using ISO/IEC 27001.It does this in the context of a wider roll out of an information security management system (ISMS) that conforms to ISO/IEC 27001.Over 224 pages, they address a range of essential topics, including an introduction to ISO27001 and ISO27002, secure development lifecycles, threat profiling and security testing, and secure coding guidelines.
    Computer Engineering/Digital Communications and Networking Operational Research and Networks   2008 This book presents the principal concepts of operations research  (OR) as tools for the planning, support and management of various  types of networks, including both physical and logical networks.Or analyzes real problems in two stages: the formalization of a  mathematical model, followed by a solution procedure, which is in  general algorithmic. it therefore consists of a collection of  models for many application areas, together with the corresponding  solution techniques. there are two important categories of models:  those based on an algebraic formalism and those using the concepts  of graphs. both concepts are presented in detail in this book,  along with general solution 0rocedures.
    Computer Engineering/General Computer Engineering The Handbook of Information and Computer Ethics   2008 Discover how developments in information technology are raising new  ethical debates   Information and computer ethics has emerged as an important area  of philosophical and social theorizing, combining conceptual,  meta-ethical, normative, and applied elements.As a result,  academic interest in this area has increased dramatically,  particularly in computer science, philosophy, and communications  departments; business schools; information and library schools; and  law schools.
    Computer Engineering/General Computer Engineering SEMICONDUCTOR MACROATOMS: BASICS PHYSICS AND QUANTUM-DEVICE APPLICATIONS   11/10/2005 This book discusses the basic physics of semiconductor macroatoms at the nanoscale as well as their potential application as building blocks for the realization of new-generation quantum devices.It provides a review on state-of-the art fabrication and characterization of semiconductor quantum dots aimed at implementing single-electron/exciton devices for quantum information processing and communication.
    Computer Engineering/General Computer Engineering Smart Technology for Aging Disability and Independence : The State of the Science   2005 Independent living with smart technologies   Smart Technology for Aging, Disability, and Independence: The  State of the Science brings together current research and  technological developments from engineering, computer science, and  the rehabilitation sciences, detailing how its applications can  promote continuing independence for older persons and those with  disabilities.
    Computer Engineering Systems Analysis and Design with UML Version 2.0: An Object-Oriented Approach 2nd Edition  

    خرید کتاب لاتین

    2005 The analysis phase answers the questions of who will use the system, what the system will do, and where and when it will be used. This is the phase that usually gets the most attention, because for most systems it is longest and most expensive single part of the development process. There is much debate over which should come first, the processes or the data, because both are important to the system. Although phased development–based methodologies enable users to interact with the system early in the process, we have observed that project teams who follow these tend to devote less attention to the analysis of the complete problem domain than they might using others. Therefore, the developer would have to choose which method should be called instead of allowing the system to do it.
    Computer Engineering/General Computer Engineering Trusted Computing   Chris Mitchell 2005 This book is designed to provide an introduction to trusted computing technology and its applications.It is divided into four main parts, as follows: 1.Introduction to trusted computing; 2.Trusted computing technologies; 3.Applications of trusted computing; and 4.The future of trusted computing.The first part consists of three chapters, each approaching trusted computing from a somewhat different perspective.
    Computer Engineering/Embedded Systems and Programming BOWMAN:ALGORITHMS & DATA STRUCTURES   10/5/2004 Preface This book instructs readers on the science of developing and analyzing algorithms.It is intended for use in a one- or two-semester undergraduate course in data structures.The text focuses on both the theoretical and practical aspects of algorithm development.It discusses problem-solving techniques and introduces the concepts of data abstraction and algorithm efficiency.
    Computer Engineering/Embedded Systems and Programming The Analysis of Algorithms   7/1/2004 Preface Computers have undergone phenomenal improvement in speed, availability, and price.This has resulted in a great deal of emphasis being placed on rapid development of correct programs, with performance playing a secondary role.Nevertheless, there are many problems for which a naIve approach is so inefficient that it is unsuitable for even the fastest and cheapest computers.
    Computer Engineering/Digital Communications and Networking Local Access Network Technologies   Paul France 2004 The work presented in this book reviews the major new access technologies that are finding their way into significant use.The book is a compilation of chapters written by several contributors, all of whom have extensive experience in the field and are internationally recognised for their work.By and large, the authors are based or associated with BT’s development facilities, now known as BT Exact, at Adastral Park, near Ipswich in the UK.
    Computer Engineering/Digital Communications and Networking Intelligent Networks: Principles and Applications  

    خرید کتاب اورجینال

    John Anderson 2002 The purpose of this book is to give some practical insight into how public telecommunications networks have advanced from the old days of offering just simple telephony services to becoming today’s ‘intelligent’ networks.Telephone companies now operate in an intensely competitive environment, and so they have to constantly struggle to find more ways to encourage customers to make ever more use of the installed network equipment.
    Computer Engineering/Embedded Systems and Programming Smart Card Manufacturing: A Practical Guide   2002 The smart card industry is booming as demand for data protection  increases.From secure e-commerce and mobile communications to  electronic tracking and ticketing systems, smart card technology  facilitates a broad array of applications.This practical guide  bridges the gap between smart card applications and software,  providing an accessible introduction to a versatile technology.
    Computer Engineering Integrated Converters: D to A and A to D Architectures, Analysis and Simulation   1/25/2001 Preface Digital technologies aim towards ever smaller, faster, less consuming transistors to lead to increasingly complex integrated digital systems.Consequently, many of the functions obtained through the use of analog integrated circuits are now entrusted to digital circuits.This has reaped substantial benefits regarding accuracy with no sensible penalty as far as area and power consumption are concerned.
    Computer Engineering/General Computer Engineering Enterprise Application Integration: A Wiley Tech Brief   2001 Learn to utilize today’s hottest EAI technologies to ensure  interoperability across your organization What exactly is  enterprise application integration (EAI)?What makes this $300  million market so hot that it’s expected to grow to $6.5 billion in  the next two years?How do you apply it in the real world?Whether  you’re an IT professional or systems architect, business manager or  software developer, if you’re looking into EAI as a solution for  unifying applications and systems across the enterprise, then the  answers are in this book.
    Computer Engineering/General Computer Engineering Digital Signal Processing: Spectral Computation and Filter Design   11/30/2000 PREFACE This text is intended for use in a first course on digital signal processing (DSP), typically in senior or first-year graduate level.It may also be useful to engineers and scientists who use digital computers to process measured data.Some elementary knowledge on signals and systems is helpful but is not necessary.An attempt has been made to make this text as self-contained as possible.
    Computer Engineering/General Computer Engineering MOLECULAR DYNAMICS ON PARALLEL COMPUTERS   2/22/2000 Molecular dynamics is a well-established technique for simulating complex many-particle systems in many areas of physics, chemistry, and astrophysics.The huge computational requirements for simulations of large systems, especially with long-range forces, demand the use of massively parallel computers.Designing efficient algorithms for these problems is a highly non-trivial task.
    Computer Engineering/General Computer Engineering Digital Integrated Circuit Design  

    خرید کتاب لاتین

    9/30/1999 PREFACE The impact of digital integrated circuits on our modem society has been pervasive.Without them, the current computer and information-technology revolution would not exist.Digital integrated circuits represent the most important enabling technology in this revolution.This is largely true because of the immense amount of signal and computer processing that can be realized in a single integrated circuit; modem integrated circuits may contain millions of logic gates.
    Computer Engineering/General Computer Engineering SOME NEW DIRECTIONS IN SCIENCE ON COMPUTERS   9/16/1997 Computers are used in today’s technological world as a powerful tool to simulate many complex phenomena in various fields.This book is an introduction to some of these exciting developments.All the articles are written by experts in their respective fields.Each article teaches by example and the book contains case studies in fields as diverse as physics, biology, fluid dynamics, astrophysics, device modeling and weather simulation.
    Computer Engineering/General Computer Engineering SEMICONDUCTOR SUPERLATTICES: GROWTH AND ELECTRONIC PROPERTIES   4/17/1995 This book surveys semiconductor superlattices, in particular their growth and electronic properties in an applied electric field perpendicular to the layers.The main developments in this field, which were achieved in the last five to seven years, are summarized.The electronic properties include transport through minibands at low electric field strengths, the Wannier–Stark localization and Bloch oscillations at intermediate electric field strengths, resonant tunneling of electrons and holes between different subbands, and the formation of electric field domains for large carrier densities at high electric field strengths.
    Computer Engineering/General Computer Engineering SELECTED TOPICS ON THE GENERAL PROPERTIES OF QUANTUM FIELD THEORY: LECTURE NOTES   11/30/1993 This book provides a readable account of the foundations of QFT, in particular of the Euclidean formulation with emphasis on the interplay between physical requirements and mathematical structures.The general structures underlying the conventional local (renormalizable) formulation of gauge QFT are discussed also on the basis of simple models.The mechanism of confinement, non-trivial topology and θ-vacua, chiral symmetry breaking and solution of the U(1) problem are clarified through a careful analysis of the Schwinger model, which settles unclear or debated points.
    Computer Engineering/General Computer Engineering SEMICONDUCTOR QUANTUM DOTS

    خرید کتاب اورجینال

    5/28/1993 Semiconductor Quantum Dots presents an overview of the background and recent developments in the rapidly growing field of ultrasmall semiconductor microcrystallites, in which the carrier confinement is sufficiently strong to allow only quantized states of the electrons and holes.The main emphasis of this book is the theoretical analysis of the confinement induced modifications of the optical and electronic properties of quantum dots in comparison with extended materials.