Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with...
Digital Library Use: Social Practice in Design and Evaluation (Digital Libraries and Electronic Publishing)
Digital Library Use: Social Practice in Design and Evaluation (Digital Libraries and Electronic Publishing)
The contributors to this volume view digital libraries (DLs) from a social as well as technological perspective. They see DLs as sociotechnical systems, networks of technology, information artifacts, and people and practices interacting with the larger world of work and society. As Bruce Schatz observes in his foreword, for a digital library to be...
Real Time UML Workshop for Embedded Systems (Embedded Technology)
Real Time UML Workshop for Embedded Systems (Embedded Technology)
"As you might expect, there are plenty of UML diagrams. Real-time UML specifications are used throughout, consistent with the purpose of the book. Designers with UML expertise who want to understand how to address real-time applications will find this book useful, as will those in the real-time world who need to understand how to bring UML...
Digital Storage in Consumer Electronics: The Essential Guide (Embedded Technology)
Digital Storage in Consumer Electronics: The Essential Guide (Embedded Technology)
This book will immediately become an indispensable reference book for the storage industry movers and shakers, developers and users. It will be a valued contribution for years to come. - Rick Wietfeldt, CTO, Emerging Technologies and Strategy, Texas Instruments, Inc.

Consumer electronics engineers, technicians, and managers,
...
MCTS: Microsoft Office SharePoint Server 2007 Configuration Study Guide: Exam 70-630
MCTS: Microsoft Office SharePoint Server 2007 Configuration Study Guide: Exam 70-630
Prepare for Microsoft's new certification for SharePoint administrators

Qualified SharePoint administrators are in demand, and what better way to show your expertise in this growing field than with Microsoft's new MCTS: Microsoft Office SharePoint Server 2007, Configuration certification. Inside, find everything you need to...

Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
"An excellent, ground breaking book, highly recommended."--Books-On-Line

The American ENIAC is customarily regarded as having been the starting point of electronic computation. This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during
...
The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
Control System Design Guide, Third Edition: Using Your Computer to Understand and Diagnose Feedback Controllers
Control System Design Guide, Third Edition: Using Your Computer to Understand and Diagnose Feedback Controllers
"No matter how much you think you may know about the subject, there is something everyone can learn from this book. This book is control systems A-Z, and is the best book I have seen on the subject."
- Dave Trapasso, Senior Project Engineer, Delphi Automotive Systems

"I enjoyed reading this book. Although I have some
...
Essentials of Computational Chemistry: Theories and Models
Essentials of Computational Chemistry: Theories and Models
Essentials of Computational Chemistry, Theories and Models provides an accessible introduction to this fast developing subject. Carefully developed to encourage student understanding, the book begins with a presentation of classical models, gradually moving on to increasingly more complex quantum mechanical and...
Optical Fiber Telecommunications V A, Fifth Edition: Components and Subsystems (Optics and Photonics Series)
Optical Fiber Telecommunications V A, Fifth Edition: Components and Subsystems (Optics and Photonics Series)
Optical Fiber Telecommunications V (A&B) is the fifth in a series that has chronicled the progress in the research and development of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition not only brings a fresh look to many essential topics but also focuses on network...
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Java in a Nutshell (The Java Series)
Java in a Nutshell (The Java Series)

The bestselling Java in a Nutshell has been updated to cover Java 1.1. If you're a Java programmer who is migrating to 1.1, this second edition contains everything you need to get up to speed on the new features of Java 1.1. Or if you are just now jumping on the Java bandwagon, Java in a Nutshell still has all of the...

Result Page: 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy