Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Design for IP Convergence
Network Design for IP Convergence
A Comprehensive “Global” Vision of Convergence

The emergence of quality-of-service (QoS) mechanisms continues to propel the development of real-time multimedia services such as VoIP and videoconferencing. However, there remain many challenges to achieving optimized standardization convergence.

...
Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Interest in Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID and WSN systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on...
VMware Certified Professional Test Prep
VMware Certified Professional Test Prep
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam. Its organized and highly practical approach will help administrators successfully complete the exam while also maximizing their ability to apply this tool on the job....
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.

This report from METASeS is written for
...
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
New Directions in Project Management (Best Practices)
New Directions in Project Management (Best Practices)
Organizations that rely on computing technology for survival understand the critical importance of managing projects that meet strategic goals and objectives. The diversity of business globalization and electronic commerce combined with the unceasing pace of technical change continues to challenge efforts for more proficient project management...
A Guide to Lean Six Sigma Management Skills
A Guide to Lean Six Sigma Management Skills
Authored by Dr, Howard Gitlow, one of the most respected Six Sigma Master Black Belts, this well-organized volume demonstrates the implementation of quality improvements into the all areas of the workplace from the shop floor through a company™s executive offices. Illustrating his points with a number of case studies, the book provides a...
Strategic Data Warehousing: Achieving Alignment with Business
Strategic Data Warehousing: Achieving Alignment with Business
Strategic Data Warehousing: Achieving Alignment with Business provides an integrated approach to achieving successful and sustainable alignment of data warehouses and business goals. It details the roles and responsibilities of the data warehouse and business managers in achieving strategic alignment, technical integration, and...
IMS: A New Model for Blending Applications (Informa Telecoms & Media)
IMS: A New Model for Blending Applications (Informa Telecoms & Media)

For over a hundred years of modern telecommunication history, public telephone communication has taken place over some form of a circuit switch transmission, which has evolved in its own right from analog to digital and from fixed to mobile networks. Now with the coming of IP Multimedia Subsystem (IMS) technology, which merges the Internet world...

Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

Design and Implementation of Data Mining Tools
Design and Implementation of Data Mining Tools

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors’ own research work, the book takes a practical approach to the...

Vulnerability Management
Vulnerability Management

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy