Home | Amazing | Today | Tags | Publishers | Years | Search 
OFDM Towards Fixed and Mobile Broadband Wireless Access
OFDM Towards Fixed and Mobile Broadband Wireless Access
Presenting the state of the art in broadband wireless access technology, this unique resource methodically presents the fundamentals of OFDM(A) technology--the cornerstone of the next generation of broadband wireless access offerings. In addition, this book succinctly depicts the future landscape of mobile broadband wireless access and the...
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Forensic Computer Crime Investigation
Forensic Computer Crime Investigation
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest...
Interoperability of Enterprise Software and Applications
Interoperability of Enterprise Software and Applications
Interoperability: the ability of a system or a product to work with other systems or products without special effort from the user is a key issue in manufacturing and industrial enterprise generally. It is fundamental to the production of goods and services quickly and at low cost at the same time as maintaining levels of quality and customisation....
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Network Design: Principles and Applications
Network Design: Principles and Applications
NETWORK DESIGN IS A COMPLEX PROCESS, requiring knowledge of several disciplines to include engineering, financial analysis, and computer science. Although the network design process was never simple, advances in technology and the introduction of new networking communications facilities and products resulted in a difficult endeavor becoming more...
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects who know enterprise development but are new to enterprise service buses (ESBs) and service–oriented architecture (SOA) development. This is the first book to cover a practical approach to SOA using the BEA...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Programming Microsoft® Robotics Studio
Programming Microsoft® Robotics Studio

In an effort to make the field of robotics accessible to a larger group of developers, Microsoft has released Microsoft Robotics Studio (MSRS). MSRS is based on the popular .NET Framework. It offers developers a standard and consistent way to develop applications for an almost limitless variety of robotic platforms. Currently,...

Transdisciplinary Digital Art: Sound, Vision and the New Screen (Communications in Computer and Information Science)
Transdisciplinary Digital Art: Sound, Vision and the New Screen (Communications in Computer and Information Science)
This volume collects selected papers from the past two instances of Digital Art Weeks (Zurich, Switzerland) and Interactive Futures (Victoria, BC, Canada), two parallel festivals of digital media art. The work represented in Transdisciplinary Digital Art is a confirmation of the vitality and breadth of the digital arts. Collecting essays that...
Result Page: 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy