 |
|
|
 How to Develop and Implement a Security Master PlanWritten for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs. It provides a thorough understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and... |  |  |  |  VoIP Handbook: Applications, Technologies, Reliability, and SecurityThe number of worldwide VoIP customers is well over 38 million and thanks to popularity of inexpensive, high quality services such as skype is projected to increase to nearly 250 million within the next three years. The future of voice transport has officially arrived.
The VoIP Handbook: Applications, Technologies, Reliability, and... |
|
 Essential Windows(r) CE Application ProgrammingThe indispensable guide to writing clean CE applications, including real-world tips, techniques, and workarounds.
Microsoft's Windows CE operating system is quickly finding its way into a wide variety of information appliances like Handheld and Palm-size PCs, television set top boxes, smart telephones, and electronic... |  |  Automotive Embedded Systems Handbook (Industrial Information Technology)Highlighting requirements, technologies, and business models, the Automotive Embedded Systems Handbook provides a comprehensive overview of existing and future automotive electronic systems. It presents state-of-the-art methodological and technical solutions in the areas of in-vehicle architectures, multipartner development... |  |  |
|
|
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 |