Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Streaming Media Demystified
Streaming Media Demystified
The experts predict that the opening of broadband internet connections and 3G wireless capabilities will drive the adoption of streaming media to 75% of all broadcasting and e-commerce firms by the end of 2003.

Author Michael Topic offers the fast, relible, and painless way to get the lowdown on the streaming of video over the internet (both...

ASP.NET AJAX Programmer's Reference: with ASP.NET 2.0 or ASP.NET 3.5
ASP.NET AJAX Programmer's Reference: with ASP.NET 2.0 or ASP.NET 3.5
ASP.NET programmers are familiar with the rich server-side programming in the ASP.NET/.NET Framework. ASP.NET AJAX adds many similar client-side features giving ASP.NET developers a feature-rich client-side framework for the first time. This book explains how ASP.NET AJAX simulates many of the rich programming features of the ASP.NET/.NET Framework...
Major Donors: Finding Big Gifts in Your Database and Online
Major Donors: Finding Big Gifts in Your Database and Online

A winning approach to developing international fundraising strategies

Philanthropy is in a renewed golden age. People want to help, to make a difference, to ensure that the things they value will flourish. In order to capitalize on potential prospects, many nonprofit professionals focus solely on the research of, or communication with,...

Green IT in Practice
Green IT in Practice

There is a scientific consensus that we need to act rapidly to cut carbon dioxide emissions if we are to limit the most extreme effects of climate change. The IT sector is in a unique position to act as a catalyst for this change. By implementing simple efficiencies, the sector can reduce its carbon footprint – which currently...

Resource Allocation in Wireless Networks: Theory and Algorithms
Resource Allocation in Wireless Networks: Theory and Algorithms

The wireless industry is in the midst of a fundamental shift from providing voice-only services to offering customers an array of multimedia services, including a wide variety of audio, video and data communications capabilities. Future wireless networks will be integrated into every aspect of daily life, and therefore could affect our life...

Convergence Technologies for 3G Networks: IP, UMTS, EGPRS and ATM
Convergence Technologies for 3G Networks: IP, UMTS, EGPRS and ATM
The merging of voice and data on a single network opens powerful new possibilities in communications. Only a fundamental understanding of both technologies will ensure you are equipped to maximise their full potential.

Convergence Technologies for 3G Networks describes the evolution from cellular to a converged network that...

Business Data Communications and Networking: A Research Perspective
Business Data Communications and Networking: A Research Perspective
Research in the area of data communications and networking is well and alive as this collection of contributions show. The book has received enhanced contributions from the authors that published in the inaugural volume of the International Journal of Business Data Communications and Networking (http://www.idea-group.com/ijbdcn). The chapters are...
Information Operations Planning
Information Operations Planning
Information operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with...
Massive WDM and TDM Soliton Transmission Systems (Solid-State Science and Technology Library)
Massive WDM and TDM Soliton Transmission Systems (Solid-State Science and Technology Library)
This book summarizes proceedings of the invited papers presented at the International Symposium on Massive WDM and TDM Soliton Transmission Systems held in Kyoto, Japan in the fall of 1999. The symposium is the third of the series and is considered to be the most representative symposium on the subject of use of optical solitons for ultrafast...
Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level, Second Edition
Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level, Second Edition

Although LEGO MINDSTORMS NXT allows anyone to build complex inventions, there are limits to what you can do with what comes inside the box. This book shows you how to advance the NXT with more than 45 exciting projects that include creating a cool magic wand that writes words in thin air, building a remotely guided vehicle, and constructing...

unlimited object storage image
Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy