Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Why purchase expensive add-on cards or bus interfaces when you can develop effective and economical data acquisition and process controls using C programs? Using the under-employed printer adapter (that is, the parallel port of your PC), you can turn your computer into a powerful tool for developing microprocessor applications. Learn how to build a...
Computing Information Technology: The Human Side
Computing Information Technology: The Human Side
From the senior management to the clerical and support group levels, this study addresses the possible pitfalls and triumphs of implementing information technology (IT) into organizations in terms of organizational strategies, structures, and communication methods. Issues of human-computer interaction, ethics, privacy, and security are raised to...
Software Piracy Exposed
Software Piracy Exposed
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software...
Handbook of Algorithms for Wireless Networking and Mobile Computing
Handbook of Algorithms for Wireless Networking and Mobile Computing

Handbook of Algorithms for Wireless Networking and Mobile Computing focuses on several aspects of mobile computing, particularly algorithmic methods and distributed computing with mobile communications capability. This volume provides the topics that are crucial for building the foundation for the design and construction of future generations of...

Information Assurance: Security in the Information Environment (Computer Communications and Networks)
Information Assurance: Security in the Information Environment (Computer Communications and Networks)
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare,...
Remoting Patterns: Foundations of Enterprise, Internet and Realtime Distributed Object Middleware
Remoting Patterns: Foundations of Enterprise, Internet and Realtime Distributed Object Middleware
Remoting offers developers many ways to customize the communications process, for efficiency, security, performance and power, and allows seamless integration of components running on several computers into a single application. This book exposes the full power of remoting to developers working in mixed platform environments in a way that will...
Wireless Sensors and Instruments: Networks, Design, and Applications
Wireless Sensors and Instruments: Networks, Design, and Applications

Wireless Sensors and Instruments explains the underlying principles of wireless instruments, which incorporate recent communications technology in instruments and instrumentation systems. This book extensively covers software support at the stand-alone instrument and network levels and includes numerous examples from industrial applications,...

Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
Instant Messaging (IM) is quickly rivaling e-mail as the electronic communications tool of choice in offices worldwide. Already used by over 100 million people globally, IM will be used more often than e-mail by 2005. Employees at 70% of U.S. companies are expected to use IM this year -- whether for legitimate business reasons or for personal...
An Introduction to Distributed Algorithms
An Introduction to Distributed Algorithms
"Barbosa makes the otherwise difficult subject of distributed algorithms very enjoyable and attractive to both students and researchers. The leading intuitive discussion of each algorithm is so very well organized and clearly written that a reader can, without the slightest effort, have a clear picture of it. An ideal textbook for an...
Collaborative Networks and Their Breeding Environments: IFIP TC 5 WG 5. 5 Sixth IFIP Working Conference
Collaborative Networks and Their Breeding Environments: IFIP TC 5 WG 5. 5 Sixth IFIP Working Conference
Progress in collaborative networks continues showing a growing number of manifestations and has led to the acceptance of Collaborative Networks (CN) as a new scientific discipline.  Contributions to CN coming from multiple reference disciplines has been extensively investigated.  In fact developments in CN have benefited from...
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
Web Data Management Practices: Emerging Techniques and Technologies
Web Data Management Practices: Emerging Techniques and Technologies
The Web revolution currently under way is making the Internet more and more central to our everyday lives. The amount of information available on the Web is increasing at an enormous rate, and almost everyday new services become available. The Internet is now widely used not only for B2B (business-to-business) and B2C (business-to-consumer)...
Result Page: 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy