Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
Wavelets and Their Applications (Digital Signal and Image Processing series)
Wavelets and Their Applications (Digital Signal and Image Processing series)
Showing how wavelets combine signal in image processing, mathematics, physics, and electrical engineering, this introduction to wavelet technology helps engineers master the basic techniques for using wavelets in such applications as image compression, turbulence, human vision, radar, and earthquake prediction. Among the topics covered are the...
Adobe Photoshop Elements 4.0: A Visual Introduction to Digital Imaging
Adobe Photoshop Elements 4.0: A Visual Introduction to Digital Imaging
If you are just starting to work with digital images and want to gain great results fast, this complete and easy-to follow guide is the one for you. Bestselling author Philip Andrews - Adobe Australia's official Photoshop Elements Ambassador -provides a clear introduction packed with step-by-step tutorials, visual examples and tips, equipping you...
Power Management of Digital Circuits in Deep Sub-Micron CMOS Technologies
Power Management of Digital Circuits in Deep Sub-Micron CMOS Technologies
In the deep sub-micron regime, the power consumption has become one of the most important issues for competitive design of digital circuits. Due to dramatically increasing leakage currents, the power consumption does not take advantage of technology scaling as before. State-of-art power reduction techniques like the use of multiple supply and...
Passive, Active, and Digital Filters (The Circuits and Filters Handbook)
Passive, Active, and Digital Filters (The Circuits and Filters Handbook)

Culled from the pages of CRC's highly successful, best-selling The Circuits and Filters Handbook, Second Edition, Passive, Active, and Digital Filters presents a sharply focused, comprehensive review of the fundamental theory behind professional applications of these complex filters. It supplies a concise, convenient reference to the key...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary form as early as the 1960’s, AR is only now becoming truly practical. Recent advances in mobile processing, coupled with an explosion in digital storage capacity, ubiquity of wireless broadband connections, mass adoption of smart phones, and...
Digital Fundamentals (8th Edition)
Digital Fundamentals (8th Edition)

For mid-level courses in Digital Electronics, Digital Logic, Computer Fundamentals, and Digital Fundamentals.Reflecting combined experience in the engineering industry and in the classroom, this bestseller provides thorough, up-to-date coverage of digital fundamentals--from basic concepts to microprocessors, programmable logic, and digital...

Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA
Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6...

Android Application Security Essentials
Android Application Security Essentials

Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.

Overview

  • Understand Android security from kernel to the application layer
  • Protect...
PowerPoint  Advanced Presentation Techniques
PowerPoint Advanced Presentation Techniques

Get ready to motivate and excite your audience with your next PowerPoint presentation! This no-nonsense, jargon-free guide dives right in to show you all the exhilarating and powerful PowerPoint features that most people don’t even know exist. Packed with priceless information that steers clear of stating the obvious, this book...

CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)
CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)

The Exam Cram method of study focuses on exactly what you need to get certified now.

In this book you'll learn how to:

  • Develop a solid foundation of VPN technologies and apply them to Cisco's VPN hardware and software...

unlimited object storage image
Result Page: 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy