Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Official (ISC)2 Guide to the SSCP CBK ((Isc)2 Press)
Official (ISC)2 Guide to the SSCP CBK ((Isc)2 Press)
SSCP Certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. For anyone who is serious about becoming a leading tactician at the front lines, the (ISC)²® Systems Security Certified Practitioner (SSCP®) Certification is an absolute necessity-demanded by cutting-edge...
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Almost three decades ago, while teaching at Toronto’s York University, serendipity struck me in the form of frame technology. Frustrated at having to reedit my customizations over and over each time I reused my code generators, I became determined to automate the splicing process. I soon discovered I had a tiger by the tail. Tigers are...
Understanding IPTV (Informa Telecoms & Media)
Understanding IPTV (Informa Telecoms & Media)
Just when we thought we had mastered modern communications-related acronyms, a new one has appeared. That acronym, IPTV, which is the subject of this book, represents an emerging technology that could change the manner by which we receive home entertainment, obtain training, operate our personal computers, and even use our cell phones. The acronym...
RFID in the Supply Chain: A Guide to Selection and Implementation (Resource Management)
RFID in the Supply Chain: A Guide to Selection and Implementation (Resource Management)
It was the publisher’s idea that I write RFID in the Supply Chain: A Guide to Selection and Implementation . Not only am I editor of Enterprise Integration System, Second Edition Handbook and author of The Complete Book of Middleware, I also had some innovative business process and project management ideas on improving the effectiveness of...
Active and Programmable Networks for Adaptive Architectures and Services
Active and Programmable Networks for Adaptive Architectures and Services
New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,...
Information Security Management Handbook, Sixth Edition (Isc2 Press)
Information Security Management Handbook, Sixth Edition (Isc2 Press)
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion...
Applied Software Risk Management: A Guide for Software Project Managers
Applied Software Risk Management: A Guide for Software Project Managers
Few software projects are completed on time, on budget, and to their original specification. Research supports that projects usually fail due to management, rather than technical, mistakes. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software...
Antipatterns: Identification, Refactoring, and Management
Antipatterns: Identification, Refactoring, and Management
AntiPatterns: Identification, Refactoring, and Management catalogs 48 bad management practices and environments common to software development, IT, and other organizations. The authors cover antipatterns of management, along with environmental/cultural antipatterns and personality antipatterns/phenotypes. Through the classification of these harmful...
The Art of Software Modeling
The Art of Software Modeling
Using a multidisciplinary approach, The Art of Software Modeling covers model theory, practice, and presentation in detail. This book describes the driving need for model creation and demonstrates how to create system models. Presenting model examples of business workflows, requirements capture, and software architecture documentation, the text...
802.1X Port-Based Authentication
802.1X Port-Based Authentication
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of...
Modeling Software with Finite State Machines: A Practical Approach
Modeling Software with Finite State Machines: A Practical Approach
This book discusses a topic that is among the central questions of software development. Therefore, we must position ourselves in that area to justify our right to express our opinion on that topic. Saying “we” implies at least one person in the co-author group. We have worked for several years in software development using various...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy