Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Mobile Telemedicine: A Computing and Networking Perspective
Mobile Telemedicine: A Computing and Networking Perspective
Wireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has...
Millimeter Wave Technology in Wireless PAN, LAN, and MAN (Wireless Networks and Mobile Communications)
Millimeter Wave Technology in Wireless PAN, LAN, and MAN (Wireless Networks and Mobile Communications)
Driven by the demand for high-data-rate, millimeter wave technologies with broad bandwidth are being explored in high-speed wireless communications. These technologies include gigabit wireless personal area networks (WPAN), high-speed wireless local area networks (WLAN), and high-speed wireless metropolitan area networks (WMAN). As a result of this...
Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)
Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)
Cisco Voice over IP (CVOICE), Third Edition, is a Cisco-authorized, self-paced learning tool for CCVP foundation learning. This book provides you with the knowledge and skills required to plan, design, and deploy a Cisco voice-over-IP (VoIP) network and to integrate gateways and gatekeepers into an enterprise VoIP network. By reading this...
Beginning XML with C# 2008: From Novice to Professional (Expert's Voice in .Net)
Beginning XML with C# 2008: From Novice to Professional (Expert's Voice in .Net)
Beginning XML with C# 2008 focuses on XML and how it is used within .NET 3.5. As you’d expect of a modern application framework, .NET 3.5 has extensive support for XML in everything from data access to configuration, from raw parsing to code documentation. This book demystifies all of this. It explains the basics of XML as well as...
Genetics Databases (Biological Techniques Series)
Genetics Databases (Biological Techniques Series)
Computer access is the only way to retrieve up-to-date nucleic acid and protein sequence and structure information.
This book, edited by Martin Bishop, describes the available information and where to find it, and is essential reading for any researcher puzzled by the wealth of on-line data.
The reader will be guided through the maze of
...
ASP Made Simple (Made Simple Programming)
ASP Made Simple (Made Simple Programming)
ASP Made Simple provides a brief introduction to ASP for the person who favours self teaching and/or does not have expensive computing facilities to learn on. The book will demonstrate how the principles of ASP can be learned with an ordinary PC running Personal Web Server, MS Access and a general text editor like Notepad.

After working through...

Usability Testing for Library Websites: A Hands-On Guide
Usability Testing for Library Websites: A Hands-On Guide
People acquire information from many sources other than libraries. For example, Barnes & Noble, Borders, and Amazon .com sell and distribute books, videos, and CDs and compete for the time and attention of our library’s customers. Barnes & Noble also provides children’s programming and Internet-related classes for families....
Pro PerformancePoint Server 2007: Building Business Intelligence Solutions (Expert's Voice in Business Intelligence)
Pro PerformancePoint Server 2007: Building Business Intelligence Solutions (Expert's Voice in Business Intelligence)
Pro PerformancePoint Server 2007 is Microsoft’s latest product in its line of business intelligence applications, a piece of software that gathers data from corporate databases and delivers it to an end user in a friendly, graphical fashion. PerformancePoint offers the next step in the digitization world. Businesses now have...
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Broadband Mobile Multimedia: Techniques and Applications (Wireless Networks and Mobile Communications)
Broadband Mobile Multimedia: Techniques and Applications (Wireless Networks and Mobile Communications)
Multimedia service provisioning is believed to be one of the prerequisites to guarantee the success of next-generation wireless networks. Examining the role of multimedia in state-of-the-art wireless systems and networks, Broadband Mobile Multimedia: Techniques and Applications presents a collection of introductory concepts,...
Result Page: 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy