Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Sams Teach Yourself Linux Security Basics in 24 Hours
Sams Teach Yourself Linux Security Basics in 24 Hours
This book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included...
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
Optical Communication Theory and Techniques
Optical Communication Theory and Techniques
Since the advent of optical communications, a great technological effort has
been devoted to the exploitation of the huge bandwidth of optical fibers. Starting
from a few Mb/s single channel systems, a fast and constant technological
development has led to the actual 10 Gb/s per channel dense wavelength division
multiplexing
...
Real-Time Collision Detection (The Morgan Kaufmann Series in Interactive 3-D Technology)
Real-Time Collision Detection (The Morgan Kaufmann Series in Interactive 3-D Technology)
Written by an expert in the game industry, Christer Ericson's new book is a comprehensive guide to the components of efficient real-time collision detection systems. The book provides the tools and know-how needed to implement industrial-strength collision detection for the highly detailed dynamic environments of applications such as 3D games,...
Hardware Hacking Projects for Geeks
Hardware Hacking Projects for Geeks

Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
Black Hole Physics - Basic Concepts and New Developments (Fundamental Theories of Physics)
Black Hole Physics - Basic Concepts and New Developments (Fundamental Theories of Physics)
It is not an exaggeration to say that one of the most exciting predictions of Einstein's theory of gravitation is that there may exist "black holes": putative objects whose gravitational fields are so strong that no physical bodies or signals can break free of their pull and escape. The proof that black holes do exist, and an analysis of...
Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Learning Game Physics with Bullet Physics and OpenGL
Learning Game Physics with Bullet Physics and OpenGL

Practical 3D physics simulation experience with modern feature-rich graphics and physics APIs

Overview

  • Create your own physics simulations and understand the various design concepts of modern games
  • Build a real-time complete game application, implementing 3D graphics and physics entirely...
unlimited object storage image
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy