Home | Amazing | Today | Tags | Publishers | Years | Search 
Algorithms and Protocols for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Boukerche is well-known and established international researcher in the field of wireless mobile networks and distributed systems. This is one of the first publications to focus on wireless ad hoc and sensor networks with a concentration on algorithms and protocols providing you with a comprehensive resource to learn about the continuous advances...
SAS 9.1.3 Intelligence Platform: Web Application Administration Guide, Third Edition
SAS 9.1.3 Intelligence Platform: Web Application Administration Guide, Third Edition
Explains how to administer the SAS Web applications that run in the middle tier of the SAS Intelligence Platform. The Web applications include the SAS Information Delivery Portal, SAS Web Report Studio, and SAS Web OLAP Viewer for Java.This guide describes the middle-tier environment, provides sample deployment scenarios, and explains how to...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
Microsoft  Windows  XP Professional Resource Kit, Third Edition
Microsoft Windows XP Professional Resource Kit, Third Edition
Definitive resources and tools—now updated for Windows XP Service Pack 2.Install, configure, and support Windows XP Professional with definitive technical guidance from the Microsoft Windows team and two industry veterans. This official RESOURCE KIT has been fully updated and revised—with coverage of...
Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications

How to Design a Secure Multimedia Encryption Scheme

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...

JUNOS For Dummies (Computer/Tech)
JUNOS For Dummies (Computer/Tech)
If you’re in charge of a network, you’re probably aware that the only time anyone notices the network is when it goes down. With JUNOS software and JUNOS For Dummies, a friendly book to help you set it up and manage the software, you might be able to start convincing your clients to believe in magic. Here’s the help you...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to...
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...
MCTS Windows Server 2008 Active Directory Services Study Guide (Exam 70-640) (SET)
MCTS Windows Server 2008 Active Directory Services Study Guide (Exam 70-640) (SET)
The Best Fully Integrated Study System Available for Exam 70-640

With hundreds of practice questions and hands-on exercises, MCTS Configuring Windows Server 2008 Active Directory Study Guide covers what you need to know-and shows you how to prepare-for this challenging exam.

  • 100% complete...
CompTIA Security+ All-in-One Exam Guide, Second Edition
CompTIA Security+ All-in-One Exam Guide, Second Edition

A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy