Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Privacy: Theory, Technologies, and Practices
Digital Privacy: Theory, Technologies, and Practices
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy:...
Building Trustworthy Semantic Webs
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. However, this improved accessibility poses a greater threat of unauthorized access, which could lead to the malicious corruption of...
Software Metrics: A Guide to Planning, Analysis, and Application
Software Metrics: A Guide to Planning, Analysis, and Application
The modern field of software metrics emerged from the computer modeling and "statistical thinking" services of the 1980s. As the field evolved, metrics programs were integrated with project management, and metrics grew to be a major tool in the managerial decision-making process of software companies. Now practitioners in the software...
Value-Added Services for Next Generation Networks (Informa Telecoms & Media)
Value-Added Services for Next Generation Networks (Informa Telecoms & Media)
In the NGN world, no truer words are spoken than "the future is now." And the competition in the information networking arena will only intensify in the next 5-10 years. Choosing the correct NGN-VAS strategy now will set your company apart. Value Added Services for Next Generation Networks examines the quest for the real added value in...
Data-driven Block Ciphers for Fast Telecommunication Systems
Data-driven Block Ciphers for Fast Telecommunication Systems
The Most Progressive and Complete Guide to DDO-Based Ciphers

Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive...

Interpreting the CMMI (R): A Process Improvement Approach, Second Edition
Interpreting the CMMI (R): A Process Improvement Approach, Second Edition
Written by experienced process improvement professionals who have developed and implemented computer based systems in organizations around the world, Interpreting the CMMIÒ: A Process Improvement Approach, Second Edition provides you with specific techniques for performing process...
Software Engineering Foundations: A Software Science Perspective
Software Engineering Foundations: A Software Science Perspective
A groundbreaking book in this field, Software Engineering Foundations: A Software Science Perspective integrates the latest research, methodologies, and their applications into a unified theoretical framework. Based on the author's 30 years of experience, it examines a wide range of underlying theories from philosophy, cognitive informatics,...
The Complete Project Management Office Handbook, Second Edition (Esi International Project Management Series)
The Complete Project Management Office Handbook, Second Edition (Esi International Project Management Series)
The Complete Project Management Office Handbook, Second Edition identifies the PMO as the essential business integrator of the people, processes, and tools that manage or influence project performance. This book details how the PMO applies professional project management practices and successfully integrates business interests with...
Information Security Management Handbook, Sixth Edition, Volume 2
Information Security Management Handbook, Sixth Edition, Volume 2
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of...
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Consumption of media has grown rapidly in the previous decade due to advances in digital technology. In recent years, the wireless industry has seen explosive growth in device capability. Everincreasing computing power, memory, and high-end graphic functionalities have accelerated the development of new and exciting wireless services. Personal...
Packet Forwarding Technologies
Packet Forwarding Technologies
As Internet traffic continues to grow exponentially, there is a great need to build Internet protocol (IP) routers with high-speed and high-capacity packet networking capabilities. The first book to explore this subject, Packet Forwarding Technologies explains in depth packet forwarding concepts and implementation technologies. It...
Design Science Research Methods and Patterns: Innovating Information and Communication Technology
Design Science Research Methods and Patterns: Innovating Information and Communication Technology
Design research promotes understanding of advanced, cutting-edge information systems through the construction and evaluation of these systems and their components. Since this method of research can produce rigorous, meaningful results in the absence of a strong theory base, it excels in investigating new and even speculative technologies, offering...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy