You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
None
Presents the principles, design, development and applications of the Diameter protocol suite The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments. This book is for everyone who wants to understand the Diameter protocol and its applications. This book explains the place Diameter holds in global telecommunication networks and teaches system architects and designers how to incorporate Diameter into their network environments. Diameter: New Generation AAA Protocol - Design, Practice and Applications begins by describing the foundation o...
No.1 bestselling author Conn Iggulden takes on the story of the mighty Kublai Khan. An epic tale of a great and heroic mind; his action-packed rule; and how in conquering one-fifth of the world's inhabited land, he changed the course of history forever. A scholar who conquered an empire larger than those of Alexander or Caesar. A warrior who would rule a fifth of the world with strength and wisdom. A man who betrayed a brother to protect a nation. From a young scholar to one of history's most powerful warriors, Conqueror tells the story of Kublai Khan - an extraordinary man who should be remembered alongside Julius Caesar, Alexander the Great and Napoleon Bonaparte as one of the greatest con...
None
This is the first comprehensive reference on trust-region methods, a class of numerical algorithms for the solution of nonlinear convex optimization methods. Its unified treatment covers both unconstrained and constrained problems and reviews a large part of the specialized literature on the subject. It also provides an up-to-date view of numerical optimization.