Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Wireless Home Networking for Dummies
Wireless Home Networking for Dummies
Pick the right equipment, secure your network, and share files

Share your Internet connection, access hot spots, and add on cool wireless peripherals

Thinking of going wireless? It’s not as scary as it sounds! This fast and fun guidebook helps you decide what you need, install it, and get the most from all its cool options....

Microcontroller Programming: The Microchip PIC
Microcontroller Programming: The Microchip PIC

Using the popular and pervasive mid-range 8-bit Microchip PICВ® as an archetype, Microcontroller Programming offers a self-contained presentation of the multidisciplinary tools needed to design and implement modern embedded systems and microcontrollers. The authors begin with basic electronics, number systems, and data concepts followed...

Real-Life MDA: Solving Business Problems with Model Driven Architecture (Interactive Technologies)
Real-Life MDA: Solving Business Problems with Model Driven Architecture (Interactive Technologies)
"The need for this book—No one has published a similar compendium of MDA case studies, making a transition to new technology is not simply a technical affair, although many of us tend to overlook this point, and the authors are superb writers. These are people who have seen a lot in the industry and have a gift for articulating important...
Mastering SQL Server 2005 Reporting Services Infrastructure Design
Mastering SQL Server 2005 Reporting Services Infrastructure Design
Design, Produce, and Distribute Reports That Mean Something

Today's DBAs need to know how to work with users, management, and key stakeholders to identify organizational needs and leverage the technology to meet them. Covering intermediate to advanced subjects, such as performance tuning, this book shows you how to build a...

EW 102: A Second Course in Electronic Warfare
EW 102: A Second Course in Electronic Warfare
Serving as a continuation of the bestselling book EW 101: A First Course in Electronic Warfare, this new volume is a second installment of popular tutorials featured in the Journal of Electronic Defense. Without delving into complex mathematics, this book gives engineers, defense contractors, managers, and government procurers a basic working...
Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)
Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)

Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols,...

Numerical Simulation of Optical Wave Propagation With Examples in MATLAB (SPIE Press Monograph Vol. PM199)
Numerical Simulation of Optical Wave Propagation With Examples in MATLAB (SPIE Press Monograph Vol. PM199)
Wave-optics simulation is an immensely useful tool for many applications. The simulation techniques in this book are directly applicable to atmospheric imaging, astronomy, adaptive optics, free-space optical communications, and LADAR. In addition, many of the basic techniques are applicable to integrated optics and nonlinear, anisotropic,...
Troubleshooting Remote Access Networks (CCIE Professional Development)
Troubleshooting Remote Access Networks (CCIE Professional Development)
A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services

* Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems
* Understand how network traffic
...

Webster's New World Telecom Dictionary
Webster's New World Telecom Dictionary
Webster’s New World Telecom Dictionary, by Ray Horak, is a comprehensive telecommunications dictionary of more than 7,500 terms critical to understanding voice, data, video, and multimedia communications system and network technologies, applications, and regulation. Given the convergence of computing and communications, the book also...
unlimited object storage image
Result Page: 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy