Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Server Virtualization: VMware and Microsoft Platforms in the Virtual Data Center
Advanced Server Virtualization: VMware and Microsoft Platforms in the Virtual Data Center

Presenting practical guidelines and examples, Advanced Server Virtualization emphasizes design, implementation, and management from both a technical and consultative point of view. It features step-by-step guidelines for planning, deployment, installing, configuring, and creating virtual servers. Covering Microsoft Virtual Server and VMware, it...

Integrating Erp, Supply Chain Management, And Smart Materials
Integrating Erp, Supply Chain Management, And Smart Materials
Organizations enjoy two kinds of strategic advantages. One is transitory: being in the right place with the right products at the right time. The other comes from having first class management and instituting processes that mobilize an organization, keeping in ahead of the competition. Which would you like to count on for your organization's...
Interpreting the CMMI: A Process Improvement Approach
Interpreting the CMMI: A Process Improvement Approach

Written by experienced process improvement professionals who have developed and implemented systems in organizations around the world, Interpreting the CMMI: A Process Improvement Approach provides you with specific techniques for performing process improvement using the CMMI and the family of CMMI models. Kulpa and Johnson describe the...

802.1X Port-Based Authentication
802.1X Port-Based Authentication
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of...
Understanding IPTV (Informa Telecoms & Media)
Understanding IPTV (Informa Telecoms & Media)
Just when we thought we had mastered modern communications-related acronyms, a new one has appeared. That acronym, IPTV, which is the subject of this book, represents an emerging technology that could change the manner by which we receive home entertainment, obtain training, operate our personal computers, and even use our cell phones. The acronym...
Building Trustworthy Semantic Webs
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. However, this improved accessibility poses a greater threat of unauthorized access, which could lead to the malicious corruption of...
Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications

How to Design a Secure Multimedia Encryption Scheme

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...

Optimization in Medicine and Biology (Engineering and Management Innovation)
Optimization in Medicine and Biology (Engineering and Management Innovation)

Thanks to recent advancements, optimization is now recognized as a crucial component in research and decision-making across a number of fields. Through optimization, scientists have made tremendous advances in cancer treatment planning, disease control, and drug development, as well as in sequencing DNA, and identifying protein...

Software Metrics: A Guide to Planning, Analysis, and Application
Software Metrics: A Guide to Planning, Analysis, and Application
The modern field of software metrics emerged from the computer modeling and "statistical thinking" services of the 1980s. As the field evolved, metrics programs were integrated with project management, and metrics grew to be a major tool in the managerial decision-making process of software companies. Now practitioners in the software...
Mobile Opportunistic Networks: Architectures, Protocols and Applications
Mobile Opportunistic Networks: Architectures, Protocols and Applications

The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark?

Featuring the contributions of prominent researchers from academia and industry,...

RFID in the Supply Chain: A Guide to Selection and Implementation (Resource Management)
RFID in the Supply Chain: A Guide to Selection and Implementation (Resource Management)
It was the publisher’s idea that I write RFID in the Supply Chain: A Guide to Selection and Implementation . Not only am I editor of Enterprise Integration System, Second Edition Handbook and author of The Complete Book of Middleware, I also had some innovative business process and project management ideas on improving the effectiveness of...
Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy