Home | Amazing | Today | Tags | Publishers | Years | Search 
Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Advances in Design and Specification Languages for Embedded Systems: Selected Contributions from FDL06
Advances in Design and Specification Languages for Embedded Systems: Selected Contributions from FDL06
Embedded systems are meanwhile in the focus of industry in quite different application domains such as automotive, avionics, telecom, and consumer products. The need for a shift in design methodologies towards system level design is widely recognised and design flows aimed to an integration of software and hardware specification and implementation...
Designing Embedded Processors: A Low Power Perspective
Designing Embedded Processors: A Low Power Perspective
As we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.

Increasingly, these systems have to consume little energy....

Point-Based Graphics (Morgan Kaufmann Series in Computer Graphics and Geometric Modeling)
Point-Based Graphics (Morgan Kaufmann Series in Computer Graphics and Geometric Modeling)
This book will present the latest research results in point-based computer graphics. After an overview of the key issues, affordable 3D scanning devices will be discussed and new concepts for the mathematical representation of point-sampled shapes will be presented. Then the authors will describe methods for high-performance and high-quality...
Pro LCS: Live Communications Server  Administration
Pro LCS: Live Communications Server Administration
Pro LCS: Live Communications Server Administration will guide you on how to best leverage Microsoft's Live Communications Server 2005 (LCS) to improve your business communications. This information-packed volume includes everything you need to know about LCS, but were afraid to ask. This includes all the different clients that you can...
IP Network-based Multi-agent Systems for Industrial Automation: Information Management, Condition Monitoring and Control of Power Systems
IP Network-based Multi-agent Systems for Industrial Automation: Information Management, Condition Monitoring and Control of Power Systems
A mobile agent is a software program with the capability to suspend its execution and resume it on another computer. Agents are a relatively recent development in computer science, which have become a popular and useful methodology for the modelling and implementation of distributed systems, particularly those consisting of a number of largely...
Field and Service Robotics: Results of the 5th International Conference (Springer Tracts in Advanced Robotics)
Field and Service Robotics: Results of the 5th International Conference (Springer Tracts in Advanced Robotics)
Patrick is a focused transport logistics company specialised in the loading and unloading of ships and the efficient land based collection, distribution and storage of cargo for import, export and within Australia.

Patrick began as a one-time small stevedore and now leader in port related transport and logistics. We’ve evolved into
...
Better Game Characters by Design: A Psychological Approach (The Morgan Kaufmann Series in Interactive 3D Technology)
Better Game Characters by Design: A Psychological Approach (The Morgan Kaufmann Series in Interactive 3D Technology)
Games are poised for a major evolution, driven by growth in technical sophistication and audience reach. Characters that create powerful social and emotional connections with players throughout the game-play itself (not just in cut scenes) will be essential to next-generation games. However, the principles of sophisticated character design and...
Legal Forms for Starting & Running a Small Business
Legal Forms for Starting & Running a Small Business
The legal documents you need on any given day!

Like most small business owners, you probably can't afford to hire a lawyer to draft the legal documents you need in the course of your day-to-day business.

Now there's an affordable solution -- Legal Forms for Starting & Running a Small Business, which provides you with over 60 legal...

Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces...
Web Communities: Analysis and Construction
Web Communities: Analysis and Construction
The rapid development of Web technology has made the World Wide Web an important and popular application platform for disseminating and searching information as well as conducting business. However, due to the lack of uniform schema for Web documents, the low precision of most search engines and the information explosion on the World Wide Web, the...
Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Result Page: 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy