Home | Amazing | Today | Tags | Publishers | Years | Search 
Parallel and Distributed Processing and Applications: Second International Symposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings
Parallel and Distributed Processing and Applications: Second International Symposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings
This book constitutes the refereed proceedings of the Second International Symposium on Parallel and Distributed Processing and Applications, ISPA 2004, held in Hong Kong, China in December 2004.

The 78 revised full papers and 38 revised short papers presented were carefully reviewed and selected from 361 submissions. The papers are organized...

Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
Next Generation Networks: Perspectives and Potentials
Next Generation Networks: Perspectives and Potentials

Next Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information.  NGN will bring tremendous advantages to companies and individuals, in terms of access to information, education and knowledge, efficiency, dematerialisation and new user experiences.

...

Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital...
Aeronautical Radio Com Systems and Networks
Aeronautical Radio Com Systems and Networks
Typically, there are over twenty radio systems on board the average commercial jet aircraft dealing with communication, navigation and surveillance functions. Very high frequency (VHF) air-to-ground communication is usually the main method of  information and control exchange between pilot and air traffic control. Satellite and high frequency...
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of...
Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
A hands-on guide to testing techniques that deliver reliable software and systems

Testing even a simple system can quickly turn into a potentially infinite task. Faced with tight costs and schedules, testers need to have a toolkit of practical techniques combined with hands-on experience and the right strategies...

Swarm Intelligence: From Natural to Artificial Systems (Santa Fe Institute Studies on the Sciences of Complexity)
Swarm Intelligence: From Natural to Artificial Systems (Santa Fe Institute Studies on the Sciences of Complexity)
Social insects--ants, bees, termites, and wasps--can be viewed as powerful problem-solving systems with sophisticated collective intelligence. Composed of simple interacting agents, this intelligence lies in the networks of interactions among individuals and between individuals and the environment. A fascinating subject, social insects are also a...
Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice)
Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice)
How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their...
ARM System Developer's Guide: Designing and Optimizing System Software (Computer Architecture and Design)
ARM System Developer's Guide: Designing and Optimizing System Software (Computer Architecture and Design)
This book has a place on the desk of every engineer developing software for the ARM processor; it is a thorough introduction for newcomers, and a useful reference for the ARM expert. I have been using this book since reviewing the first draft, and I can recommend it to anyone who wants the get the most out of their ARM powered products.
Peter
...
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)

Network Analysis, Architecture, and Design, 2nd Edition, uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the...

Writing Secure Code for Windows Vista (Pro - Step By Step Developer)
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)

Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...

Result Page: 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy