Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IoT Security Issues
IoT Security Issues

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the...
Intermediate Robot Building
Intermediate Robot Building

Greetings robot builder!

Over the years, I’ve created many homemade robots (some of which, only the builder could love). However, with each successive robotic generation, I try to gradually expand my knowledge of electronics, mechanics, machining, software, and art by experimenting with new techniques, features, or parts...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Computer Models in Biomechanics: From Nano to Macro
Computer Models in Biomechanics: From Nano to Macro

This book contains a collection of papers that were presented at the IUTAM Symposium

on “Computer Models in Biomechanics: From Nano to Macro” held at Stanford University, California, USA, from August 29 to September 2, 2011.

It contains state-of-the-art papers on:

- Protein and Cell...

Optimal Portfolio Modeling, CD-ROM includes Models Using Excel and R: Models to Maximize Returns and Control Risk in Excel and R (Wiley Trading)
Optimal Portfolio Modeling, CD-ROM includes Models Using Excel and R: Models to Maximize Returns and Control Risk in Excel and R (Wiley Trading)

it takes more than just precise timing and picking the right stocks to achieve exceptional results in today's markets. In order to capture consistent success, you need to strike the right balance between position sizing and risk management.

Nobody understands this better than author Philip McDonnell, and with Optimal Portfolio Modeling,...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Advances in Computer-Supported Learning
Advances in Computer-Supported Learning
The Internet and growth of computer networks have eliminated geographic barriers, creating an environment where education can be brought to a student no matter where that student may be. The success of distance learning programs and the availability of many Web-supported applications and multimedia resources have increased the effectiveness of...
Microsoft SharePoint 2010 Administration Cookbook
Microsoft SharePoint 2010 Administration Cookbook

SharePoint 2010 enables businesses to set up collaboration with, and for, many types of entities (employees, vendors, customers, and so on) while integrating disparate technologies. It has proved so valuable a tool at many organizations that its growth has led it to become a mission-critical application. As SharePoint has grown through each...

History of Wireless
History of Wireless
Important new insights into how various components and systems evolved

Premised on the idea that one cannot know a science without knowing its history, History of Wireless offers a lively new treatment that introduces previously unacknowledged pioneers and developments, setting a new standard for understanding the evolution of this important...

High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)

Progress in biology is dependent on the ability to observe, measure, and model the behavior of organisms at multiple levels of abstraction, from the microscopic to the macroscopic. There has been a tremendous growth recently in the techniques to probe the structure and workings of cellular and organ-level mechanisms. Significant advances have...

Result Page: 99 98 97 96 95 94 93 92 91 90 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy