IEEE Standard for Information Technology
Author :
Publisher :
Page : 164 pages
File Size : 26,50 MB
Release : 2004
Category : Computer software
ISBN : 9780738138862
Author :
Publisher :
Page : 164 pages
File Size : 26,50 MB
Release : 2004
Category : Computer software
ISBN : 9780738138862
Author : Sudhā Mūrti
Publisher : Penguin Books India
Page : 164 pages
File Size : 31,3 MB
Release : 2006
Category : Juvenile Fiction
ISBN : 9780143330066
A princess thinks she was a bird, a coconut that cost a thousand rupees, and a shepherd with a bag of words...Kings and misers, princes and paupers, wise men and foolish boys, the funniest and oddest men and women come alive in this sparkling new collection of stories. The clever princess will only marry the man who can ask her a question she cannot answer; the orphan boy outwits his greedy uncles with a bag of ash; and an old couple in distress is saved by a magic drum. Sudha Murty's grandparents told her some of these stories when she was a child; others she heard from her friends from around the world. These delightful and timeless folktales have been her favourites for years, and she has recounted them many times over to the young people in her life. With this collection, they will be enjoyed by many more readers, of all ages. Age group of target audience is 8+.
Author : Jack London
Publisher : IndyPublish.com
Page : 572 pages
File Size : 45,57 MB
Release : 1906
Category : Fiction
ISBN :
JACK LONDON (1876-1916), American novelist, born in San Francisco, the son of an itinerant astrologer and a spiritualist mother. He grew up in poverty, scratching a living in various legal and illegal ways -robbing the oyster beds, working in a canning factory and a jute mill, serving aged 17 as a common sailor, and taking part in the Klondike gold rush of 1897. This various experience provided the material for his works, and made him a socialist. "The son of the Wolf" (1900), the first of his collections of tales, is based upon life in the Far North, as is the book that brought him recognition, "The Call of the Wild" (1903), which tells the story of the dog Buck, who, after his master ́s death, is lured back to the primitive world to lead a wolf pack. Many other tales of struggle, travel, and adventure followed, including "The Sea-Wolf" (1904), "White Fang" (1906), "South Sea Tales" (1911), and "Jerry of the South Seas" (1917). One of London ́s most interesting novels is the semi-autobiographical "Martin Eden" (1909). He also wrote socialist treatises, autobiographical essays, and a good deal of journalism.
Author :
Publisher :
Page : 107 pages
File Size : 28,99 MB
Release : 2000
Category : Electric lines
ISBN : 9780738118314
This newly developed guide compiles information on the application considerations of protective relays to ac transmission lines. The guide describes accepted transmission line protection schemes and the different electrical system parameters and situations that affect their application. Its purpose is to provide a reference for the selection of relay schemes and to assist less experienced protective relaying engineers in their application.
Author : Rob Cimperman
Publisher : Pearson Education
Page : 298 pages
File Size : 15,5 MB
Release : 2006-11-28
Category : Computers
ISBN : 0132702622
This is the eBook version of the printed book. This digtial Short Cut provides a concise and supremely useful guide to the emerging trend of User Acceptance Testing (UAT). The ultimate goal of UAT is to validate that a system of products is of sufficient quality to be accepted by the users and, ultimately, the sponsors. This Short Cut is unique in that it views UAT through the concept that the user should be represented in every step of the software delivery lifecycle--including requirements, designs, testing, and maintenance--so that the user community is prepared, and even eager, to accept the software once it is completed. Rob Cimperman offers an informal explanation of testing, software development, and project management to equip business testers with both theory and practical examples, without the overwhelming details often associated with books written for "professional" testers. Rather than simply explaining what to do, this resource is the only one that explains why and how to do it by addressing this market segment in simple, actionable language. Throughout the author’s considerable experience coordinating UAT and guiding business testers, he has learned precisely what testers do and do not intuitively understand about the software development process. UAT Defined informs the reader about the unfamiliar political landscape they will encounter. Giving the UAT team the tools they need to comprehend the process on their own saves the IT staff from having to explain test management from the beginning. The result is a practice that increases productivity and eliminates the costs associated with unnecessary mistakes, tedious rework, and avoidable delays. Chapter 1 Introduction Chapter 2 Defining UAT–What It Is...and What It Is Not Chapter 3 Test Planning–Setting the Stage for UAT Success Chapter 4 Building the Team–Transforming Users into Testers Chapter 5 Executing UAT–Tracking and Reporting Chapter 6 Mitigating Risk–Your Primary Responsibility
Author : Honeynet Project
Publisher : Addison-Wesley Professional
Page : 768 pages
File Size : 30,83 MB
Release : 2004
Category : Computers
ISBN : 9780321166463
A guide to computer security discusses how the "blackhat community" uses the Internet for destructive purposes and provides information on how to learn from a "blackhat" attack to protect computer networks.
Author : Charles Cresson Wood
Publisher :
Page : 740 pages
File Size : 19,26 MB
Release : 2005-04-01
Category : Computers
ISBN : 9781881585138
Author :
Publisher :
Page : 201 pages
File Size : 13,56 MB
Release : 2010
Category :
ISBN : 9780738163512
Abstract: This amendment specifies improved mechanisms, as policies and medium access control enhancements, to enable coexistence among license-exempt systems based on IEEE Std 802.16 and to facilitate the coexistence of such systems with primary users. Keywords: broadband wireless access, BWA, coexistence, Coexistence Control Channel, coexistence mechanism, Coexistence Protocol, Coexistence Signaling, contention-based protocol, license-exempt, OFDMA, radio, standard, WAS, wireless access systems, WirelessMAN®, WirelessMAN-CX, WirelessMAN-UCP, wireless metropolitan area network.