Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)
Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)
Cisco Voice over IP (CVOICE), Third Edition, is a Cisco-authorized, self-paced learning tool for CCVP foundation learning. This book provides you with the knowledge and skills required to plan, design, and deploy a Cisco voice-over-IP (VoIP) network and to integrate gateways and gatekeepers into an enterprise VoIP network. By reading this...
Optical Scanning Holography with MATLAB®
Optical Scanning Holography with MATLAB®

Optical Scanning Holography is an exciting new field with many potential novel applications. This book contains tutorials, research materials, as well as new ideas and insights that will be useful for those working in the field of optics and holography. The book has been written by one of the leading researchers in the field. It covers the...

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

Jitter, Noise, and Signal Integrity at High-Speed
Jitter, Noise, and Signal Integrity at High-Speed

State-of-the-art JNB and SI Problem-Solving: Theory, Analysis, Methods, and Applications

 

Jitter, noise, and bit error (JNB) and signal integrity (SI) have become today‘s greatest challenges in high-speed digital design. Now, there’s a...

Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in digital forensic analysis of Windows systems. I am simply someone who has found an interest in my chosen field of employment, and a passion to dig deeper. I enjoy delving into and extending the...
Digital Image Forensics: There is More to a Picture than Meets the Eye
Digital Image Forensics: There is More to a Picture than Meets the Eye

Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical...

Canon EOS Rebel T5i/700D Digital Field Guide
Canon EOS Rebel T5i/700D Digital Field Guide

All you need to know to use the latest exciting new dslr camera from Canon

If you want to get great photos from Canon's new Rebel T5i/700D dslr camera, you've come to the right place. This practical book takes you step by step through each button, mode, function, and feature of the hot new Rebel T5i/700D, so...

Digital Da Vinci: Computers in Music
Digital Da Vinci: Computers in Music

The Digital Da Vinci book series opens with the interviews of music mogul Quincy Jones, MP3 inventor Karlheinz Brandenburg, Tommy Boy founder Tom Silverman and entertainment attorney Jay L. Cooper. A strong supporter of science, technology, engineering and mathematics programs in schools, The Black Eyed Peas founding member will.i.am...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications
Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications

Get up and running with the fundamentals of Bitcoin and blockchain

Key Features

  • Learn quick, effective, and easy ways to master blockchain and Bitcoin
  • Understand the impact of decentralization and discover ways to tackle it
  • Explore the future of Bitcoin...
Signals and Systems using MATLAB
Signals and Systems using MATLAB
Although it is hardly possible to keep up with advances in technology, it is reassuring to know that in science and engineering, development and innovation are possible through a solid understanding of basic principles. The theory of signals and systems is one of those fundamentals, and it will be the foundation of much research and...
unlimited object storage image
Result Page: 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy