Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Grid Database Design
Grid Database Design
Computing has come a long way since our earliest beginnings. Many of
us have seen complete revisions of computing technology in our lifetimes.

I am not that old, and I have seen punch cards and Cray supercomputers,
numbered Basic on an Apple IIe, and highly structured C. Nearly all of
us can remember when the World Wide
...
Security Software Development: Assessing and Managing Security Risks
Security Software Development: Assessing and Managing Security Risks
Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development...
Lightweight Enterprise Architectures
Lightweight Enterprise Architectures
For several years, it has been a goal of mine to write a book on
enterprise architecture. While there are many good architectural books in circulation,
they are either limited in scope or lack sufficient detail to be actionable.
Early in my career, I found it difficult to translate the principles of these
books into a logical
...
Carrier Ethernet: Providing the Need for Speed
Carrier Ethernet: Providing the Need for Speed
Facilitating high data transfers over long distances at a reasonable cost, Carrier Ethernet is solidifying its fundamental position as the core of next-generation networks. Since it first dazzled the IT world 40 years ago with its ability to move data over local networks, Ethernet has dramatically evolved in both form and function. And now, Carrier...
Wireless Mesh Networking: Architectures, Protocols and Standards
Wireless Mesh Networking: Architectures, Protocols and Standards

This is the first book to provide readers a comprehensive technical guide covering recent and open issues in wireless mesh networks. Wireless Mesh Networking: Architectures, Protocols and Standards explores the various key challenges in diverse scenarios as well as emerging standards, including capacity and scalability. It focuses on concepts,...

Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas
Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas
A large portion of the network capacity of an ad hoc network can be wasted by the medium access mechanisms of omni-directional antennas. To overcome this problem, researchers propose the use of directional or adaptive antennas that largely reduce radio interference, improving the utilization of wireless medium and the resulting network throughput....
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Recent advancement and increased growth in Web technologies have resulted in an even greater need for more efficient scheduling and data transmission strategies. An increased reliance on wireless communications devices, with their constraint issues, has further complicated the problem. While both push and pull strategies provide certain solutions,...
HOWTO Secure and Audit Oracle 10g and 11g
HOWTO Secure and Audit Oracle 10g and 11g
This guide demonstrates how to secure sensitive data and comply with internal and external audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that...
Real Process Improvement Using the CMMI
Real Process Improvement Using the CMMI
This book offers non-academic, real-world approaches to implementing CMMI-based process improvement in an organization. The author identifies critical concepts of CMMI, and details how to turn them into real process improvement.

Real Process Improvement Using the CMMI provides real-world concepts and techniques for CMMI-based...

Web-to-Host Connectivity
Web-to-Host Connectivity
Nobody can dispute the incredible impact that the Web continues to have on the way in which people work, shop, research, play, and communicate. In the span of just a few short years, enterprises in nearly every industry and market have had to reevaluate the way in which they do business with their business partners and end customers. Having a...
Network Design for IP Convergence
Network Design for IP Convergence
A Comprehensive “Global” Vision of Convergence

The emergence of quality-of-service (QoS) mechanisms continues to propel the development of real-time multimedia services such as VoIP and videoconferencing. However, there remain many challenges to achieving optimized standardization convergence.

...
Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Architecture: An Integrated Approach to Security in the Organization

This book is dedicated to my husband, Todd A. Tudor, and my three children, Drew, Allyssa, and Chad, who spent many hours patiently waiting for my time and attention while this book was being written.

Profits from this book will be contributed to the children of the world through the YMCA in Ethiopia, Africa, and through The...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy