Home | Amazing | Today | Tags | Publishers | Years | Search 
Rethinking Enterprise Storage: A Hybrid Cloud Model
Rethinking Enterprise Storage: A Hybrid Cloud Model
Just as the Internet has fundamentally changed many industries, cloud computing is fundamentally changing the information technology industry, including infrastructures such as enterprise data storage. This book is about one of the new infrastructure game changers—a storage architecture called hybrid cloud storage that was...
Real-Time Systems Design and Analysis: Tools for the Practitioner
Real-Time Systems Design and Analysis: Tools for the Practitioner

The leading text in the field explains step by step how to write software that responds in real time

From power plants to medicine to avionics, the world increasingly depends on computer systems that can compute and respond to various excitations in real time. The Fourth Edition of Real-Time Systems Design and...

People Skills
People Skills
This is a book intended for a wide readership, covering a range of occupations that come under the broad heading of ‘people work’. This includes health and social care staff, social workers, staff in professions allied to medicine, youth workers, counsellors, advisors, advocates, personnel officers and other managers,...
Sonic Interaction Design
Sonic Interaction Design

Sound is an integral part of every user experience but a neglected medium in design disciplines. Design of an artifact's sonic qualities is often limited to the shaping of functional, representational, and signaling roles of sound. The interdisciplinary field of sonic interaction design (SID) challenges these prevalent approaches by...

Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu
Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu

This book constitutes the refereed proceedings of the 6th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2011, held in Chengdu, China, in August 2011. The 26 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers address all...

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in...

Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary form as early as the 1960’s, AR is only now becoming truly practical. Recent advances in mobile processing, coupled with an explosion in digital storage capacity, ubiquity of wireless broadband connections, mass adoption of smart phones, and...
Signal Transduction Protocols (Methods in Molecular Biology)
Signal Transduction Protocols (Methods in Molecular Biology)

It is increasingly clear that signal transduction is a highly organized and integrated process.  Divided into two convenient sections, Signal Transduction Protocols, Third Edition focuses on experimental approaches to better understand the complexity of signal transduction.  Introductory chapters provide perspective on...

A Manager's Guide to IT Law
A Manager's Guide to IT Law
Since the 1940s, when the computer first made its appearance, there has been a tremendous change in both the power and the extent of IT technology. It has evolved from mainframes through personal computers with packaged applications and client–server architectures, to the explosion of networking in the 1990s which led to...
Managing Risk and Information Security: Protect to Enable
Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on is often beyond what they have been prepared for. The nature of securing an enterprise is daunting and overwhelming. There are no simple checklists or roadmaps for success. Many of the technical security skills a CISO has acquired during the early...
Data Fusion: Concepts and Ideas
Data Fusion: Concepts and Ideas

This textbook provides a comprehensive introduction to the concepts and idea of multisensor data fusion.
It is an extensively revised second edition of the author's successful book: "Multi-Sensor Data Fusion:
An Introduction" which was originally published by Springer-Verlag in 2007.
The main changes in
...

Result Page: 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy