Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking

This book provides an overview of steganography and digital watermarking, two areas of research which are generally referred to as "information hiding." Steganography studies ways to make communication invisible by hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...

Data Mining in Biomedicine Using Ontologies
Data Mining in Biomedicine Using Ontologies

An ontology is a set of vocabulary terms with explicitly stated meanings and relations with other terms. Presently, a growing number of ontologies are being built and used for annotating data in biomedical research. Thanks to the tremendous amount of data being generated, ontologies are now being used in numerous ways, including connecting...

A Professional's Guide To Data Communication In a TCP/IP World
A Professional's Guide To Data Communication In a TCP/IP World
Resource provides a comprehensive picture of the Internet protocol stack and the role of TCP/IP in data communications. Offers a thorough understanding of advanced LAN and WAN technologies, an integrated view of bridging operations, and how to ensure privacy with virtual LAN. DLC: TCP/IP...
SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

Advanced Database Technology and Design (Artech House Computer Library)
Advanced Database Technology and Design (Artech House Computer Library)
Since computers were introduced to automate organization management,
information system evolution has influenced data management considerably.
Applications demand more and more services from information stored in
computing systems. These new services impose more stringent conditions on
the currently prevailing client/server
...
Testing and Quality Assurance for Component-Based Software (Artech House Computer Library.)
Testing and Quality Assurance for Component-Based Software (Artech House Computer Library.)
The widespread development and reuse of software components is regarded
by many as one of the next biggest phenomena for software. Reusing
high-quality software components in software development has the potential
for drastically improving the quality and development productivity of
component-based software. However, the
...
Successful Proposal Strategies For Small Businesses
Successful Proposal Strategies For Small Businesses
Successful Proposal Strategies for Small Businesses: Using Knowledge
Management to Win Government, Private-Sector, and International
Contracts, Fourth Edition, is designed to provide entrepreneurs, as
well as beginner and experienced proposal managers, capture managers,
proposal writers, proposal specialists and coordinators,
...
Introduction to GPS: The Global Positioning System
Introduction to GPS: The Global Positioning System
If you're looking for an up-to-date, easy-to-understand treatment of the GPS (Global Positioning System), this one-of-a-kind resource offers you the knowledge you need for your work, without bogging you down with advanced mathematics. It addresses all aspects of the GPS, emphasizes GPS applications, examines the GPS signal structure, and covers the...
3G CDMA2000 Wireless System Engineering
3G CDMA2000 Wireless System Engineering
Breaking down complex technology into easy-to-understand concepts, this hands-on, system-level resource offers expert guidance in designing, optimizing, and managing a CDMA2000 wireless network. The book focuses on the development of practical knowledge that can be readily applied in the field, and also provides the theoretical background needed to...
Innovations in Internetworking (Artech House Telecommunication Library)
Innovations in Internetworking (Artech House Telecommunication Library)
Choosing the proper boundaries between functions is perhaps the primary activity of the computer system designer. Design principles that provide guidance in this choice of function placement are among the most important tools of a system designer. This paper discusses one class of function placement argument that has been used for...
Gsm and Personal Communications Handbook (Artech House Mobile Communications Library)
Gsm and Personal Communications Handbook (Artech House Mobile Communications Library)
Here is the most comprehensive reference available on GSM applications and services that?s intended to build on -- not replace -- the basic technical information in the authors? original bestseller, An Introduction to GSM. The book provides a close-up look at this hot technology, offers in-depth discussions of the features and services available...
Result Page: 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy