Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
A timely reference in the innovative and cutting-edge field of multimedia security!

Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3
...
Python Phrasebook (Developer's Library)
Python Phrasebook (Developer's Library)

I was excited when my editor asked me to write a phrasebook on the Python language. The phrasebook is one of the smallest books I have ever written; however, it was one of the hardest.

The idea of a conventional phrasebook is to provide readers with quick phrases that actually mean something in the language. The Python
...

Oracle Collaboration Suite Handbook (Osborne Oracle Press)
Oracle Collaboration Suite Handbook (Osborne Oracle Press)
Oracle Collaboration Suite 10g is an integrated collection of software applications built upon the foundational technology components of the Oracle Database and Application Server, that provide business users with the ability to communicate, exchange critical information, and work together in real-time regardless of where they are physically...
EPSS Revisited: A Lifecycle for Developing Performance-Centered Systems
EPSS Revisited: A Lifecycle for Developing Performance-Centered Systems

EPSS Revisited is a compendium of articles gathered primarily from four special issues of ISPI's Performance Improvement (PI) journal between July 1999 and December 2002. These were issues for which I served as guest editor during a period when I was refining a performance-centered design...

Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) (Authorized Self-Study Guide)
Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) (Authorized Self-Study Guide)
Professional certifications have been an important part of the computing industry for many years and will continue to become more important. Many reasons exist for these certifications, but the most popularly cited reason is that of credibility. All other considerations held equal, a certified employee/consultant/job candidate is considered more...
Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)

Humans receive the great majority of information about their environment through sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key component for building artificial systems that can perceive and understand their environment. Computer vision is likely to change society in many ways; for example, it...

The Kindle Fire Pocket Guide
The Kindle Fire Pocket Guide

This affordable and engaging guide is packed with practical information to you help you get the most from your Kindle Fire. Amazon Kindle expert Scott McNulty offers plenty of tips and pointers for using Amazon's trim tablet, including how to download apps, read books, take advantage of the Amazon cloud, and browse...

Samsung SmartTV Application Development
Samsung SmartTV Application Development

Take your apps from the small screen to the big screen and start developing for the Samsung SmartTV now!
 

Samsung’s SmartTV platform gives developers the opportunity to bring the app experience to the world of home entertainment, creating a more interactive and engaging way to reach their audience. If...

Web Caching (O'Reilly Internet Series)
Web Caching (O'Reilly Internet Series)
A properly designed cache, by reducing network traffic and improving access times to popular web sites, is a boon to network administrators and web users alike. This book hands you all the technical information you need to design, deploy and operate an effective web caching service. It also covers the...
The PHP Anthology, Volume II: Applications
The PHP Anthology, Volume II: Applications
A compilation of best practice solutions to common Web Development problems in PHP, focusing on the achievement of practical goals by applying well-structured, object orientated software design principles.

Volume 2 covers the applications of PHP in the real world including authentication & access control, XML, stats & tracking, caching...

Error Free Software: Know-How and Know-Why of Program Correctness (Wiley Series in Software Engineering Practice)
Error Free Software: Know-How and Know-Why of Program Correctness (Wiley Series in Software Engineering Practice)
This book is the result of an evolutionary process which took place over a number of years. The contents of this book are based on my seminar for experienced software developers, which I instruct internationally, andon courses which I have taught as an external lecturer in the Informatics Department of the Johann Wolfgang Goethe University in...
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
unlimited object storage image
Result Page: 279 278 277 276 275 274 273 272 271 270 269 268 267 266 265 264 263 262 261 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy