Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Strategy: The Road to Web Services Solutions
Internet Strategy: The Road to Web Services Solutions
Internet Strategy: The Road to Web Services Solutions reminds readers that several attempts have been made to convince the world that DOT.COM was developed to take over businesses, and the traditional way of creating businesses and running organizations would be condemned to the past. One of those attempts led to the Application Service Provision...
Understanding Forensic Digital Imaging
Understanding Forensic Digital Imaging
The science of digital imaging can be divided into two separate branches: the techniques that explain how to use and create digital images, and the technical knowledge that is necessary to design cameras, computers, and software. The expert witness should be a skilled practitioner in the techniques and have enough understanding of the technical...
Mobile WiMAX (Wiley - IEE)
Mobile WiMAX (Wiley - IEE)

With the wide and rapid deployment of wireless LANs technology, WiMAX is an emerging technology in wireless communication and is one of the hottest subjects in wireless communications.

Mobile WiMAX is based on selected papers and plenary speeches from the 2007 IEEE Mobile WiMAX Symposium, this book provides...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
The NURBS Book (Monographs in Visual Communication)
The NURBS Book (Monographs in Visual Communication)

The second, revised edition of this book covers all aspects of non-uniform rational B-splines necessary to design geometry in a computer-aided environment. Basic B-spline features, curve and surface algorithms, and state-of-the-art geometry tools are all discussed. Detailed code for design algorithms and computational tricks are covered, too,...

The Trouble with Higher Education: A Critical Examination of our Universities
The Trouble with Higher Education: A Critical Examination of our Universities

The Trouble with Higher Education is a powerful and topical critique of the Higher Education system in the UK, with relevance to countries with similar systems.  Based on the authors’ experiences that span over 30+ years of fieldwork, the issues discussed focus on the problems facing the principle responsibilities of...

The Psychology of the Internet
The Psychology of the Internet
This timely volume explores the psychological aspects of cyberspace, a virtual world in which people from around the globe are acting and interacting in many new, unusual, and occasionally alarming ways. Drawing on research in the social sciences, communications, business, and other fields, Patricia Wallace examines how the online environment can...
Nonprofit Internet Strategies: Best Practices for Marketing, Communications, and Fundraising Success
Nonprofit Internet Strategies: Best Practices for Marketing, Communications, and Fundraising Success
Nonprofit Internet Strategies offers every charitable organization the opportunity to analyze their options and select the appropriate strategy to integrate traditional marketing, communications, and fundraising practices with their online efforts.

It is an excellent how-to guide--a practical manual for nonprofit staff
...
Secure Roaming in 802.11 Networks (Communications Engineering)
Secure Roaming in 802.11 Networks (Communications Engineering)
WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide...
Swarm Intelligence in Data Mining (Studies in Computational Intelligence)
Swarm Intelligence in Data Mining (Studies in Computational Intelligence)
Science is a swarm.

To the layperson, the stereotypical scientist is logical, clear-thinking, wellinformed but perhaps socially awkward, carefully planning his or her experiments and then analyzing the resulting data deliberately, with precision. The scientist works alone, emotion-free, searching only for truth, having been well advised
...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy