Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dictionary of Computer and Internet Terms (Words R Us Computer Dictionaries) (Volume 1)
Dictionary of Computer and Internet Terms (Words R Us Computer Dictionaries) (Volume 1)

This dictionary contains over 32,000 terms that are specific to Computers and the Internet. Each term includes a definition / description. With more than 750 pages, this dictionary is one of the most comprehensive resources available. Terms relate to applications, commands, functions, operating systems, image processing and networking. No...

TCP/IP Protocol Suite (Mcgraw-hill Forouzan Networking)
TCP/IP Protocol Suite (Mcgraw-hill Forouzan Networking)

In a world where the number of people who need to learn about data communications and networking is exploding, Forouzan's book is the answer. The book's visual approach makes it easy for students to learn about and understand the concepts involved in this rapidly developing field.

TCP/IP Protocol Suite teaches students and...

IoT Security Issues
IoT Security Issues

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack...

Advances in Intelligent Informatics (Advances in Intelligent Systems and Computing)
Advances in Intelligent Informatics (Advances in Intelligent Systems and Computing)
The third International Symposium on Intelligent Informatics (ISI-2014) provided a forum for sharing original research results and practical development experiences among experts in the emerging areas of Intelligent Informatics. This edition was co-located with third International Conference on Advances in Computing, Communications...
Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Engineering Mathematics 4th edn: A Foundation for Electronic, Electrical, Communications and Systems Engineers (4th Edition)
Engineering Mathematics 4th edn: A Foundation for Electronic, Electrical, Communications and Systems Engineers (4th Edition)

Popular electrical engineering maths textbook, packed full of relevant modern applications and a huge number of examples and exercises.

...
A Computational Introduction to Number Theory and Algebra
A Computational Introduction to Number Theory and Algebra
"This is an outstanding and well-written book whose aim is to introduce the reader to a broad range of material -- ranging from basic to relatively advanced -- without requiring any prior knowledge on the part of the reader other than calculus and mathematical maturity. That the book succeeds at this goal is quite an accomplishment! ...this...
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Time Mastery: How Temporal Intelligence Will Make You A Stronger, More Effective Leader
Time Mastery: How Temporal Intelligence Will Make You A Stronger, More Effective Leader
"To be most effective, leaders must move beyond time management to time mastery. Time managers are reliant on clocks and calendars; time masters develop an intuitive sense of timing. Time managers see time as a fixed, rigid constant; time masters view it as relative and malleable. Time masters have what John Clemens and Scott Dalrymple call...
RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Smart Grid Security: Innovative Solutions for a Modernized Grid
Smart Grid Security: Innovative Solutions for a Modernized Grid

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power...

Custom Raspberry Pi Interfaces: Design and build hardware interfaces for the Raspberry Pi
Custom Raspberry Pi Interfaces: Design and build hardware interfaces for the Raspberry Pi

Design and build custom hardware interfaces for the Raspberry Pi and discover low cost display and sensor options for embedded system projects. 

With this book you'll master 12C communications using Raspbian Linux in C++ and perform ADC and DAC experiments. You'll experiment with debounce buttons and switches using...

Result Page: 142 141 140 139 138 137 136 135 134 133 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy