 |
|
|
|
 |  |  Active and Programmable Networks for Adaptive Architectures and ServicesNew applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... |  |  |
|
|
 Business Intelligence for Telecommunications (Informa Telecoms & Media)Bringing together market research reports, business analyst briefings, and technology references into one comprehensive volume, Business Intelligence for Telecommunications identifies those advances in both methods and technology that are being employed to inform decision-making and give companies an edge in the rapidly growing and... |  |  Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding... |  |  Complete Guide to CISM CertificationComplete Guide to CISMЮ Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,... |
|
 High-Performance Web Databases: Design, Development, and DeploymentIN THE PAST FEW DECADES, DATABASE SOLUTIONS AND DATA MANAGEMENT OPERATIONS HAVE SUPPORTED AN EVER-EXPANDING RANGE OF SOLUTIONS AND TECHNOLOGY ARCHITECTURES.
There is no abatement to this trend. Many end-to-end Information Technology (IT) solutions in the current environment include access to the World Wide Web and integration with one... |  |  Software Engineering Foundations: A Software Science PerspectiveA groundbreaking book in this field, Software Engineering Foundations: A Software Science Perspective integrates the latest research, methodologies, and their applications into a unified theoretical framework. Based on the author's 30 years of experience, it examines a wide range of underlying theories from philosophy, cognitive informatics,... |  |  Security in an IPv6 EnvironmentAs the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 |