Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ZigBee Wireless Networks and Transceivers
ZigBee Wireless Networks and Transceivers
ZigBee is a short-range wireless networking standard backed by such industry leaders as Motorola, Texas Instruments, Philips, Samsung, Siemens, Freescale, etc. It supports mesh networking, each node can transmit and receive data, offers high security and robustness, and is being rapidly adopted in industrial, control/monitoring, and medical...
Integrated Silicon Optoelectronics (Springer Series in Optical Sciences)
Integrated Silicon Optoelectronics (Springer Series in Optical Sciences)

Integrated Silicon Optoelectronics synthesizes topics from optoelectronics and microelectronics. The book concentrates on silicon as the major base of modern semiconductor devices and circuits. Starting from the basics of optical emission and absorption, as well as from the device physics of photodetectors, the aspects of the integration of...

Building Telephony Systems with OpenSIPS 1.6
Building Telephony Systems with OpenSIPS 1.6

SIP is the most important VoIP protocol and OpenSIPS is clearly the open source leader in VoIP platforms based on pure SIP. The whole telecommunication industry is changing to an IP environment, and telephony in the way we know today will disappear in less than ten years. SIP is the protocol leading this disruptive revolution and it is one of...

Wireless Networking Complete (Morgan Kaufmann Series in Networking)
Wireless Networking Complete (Morgan Kaufmann Series in Networking)

Given the explosion of new wireless communications techniques and the host of wireless network technologies and applications currently available or on the drawing board, it is safe to say that we are in the midst of a wireless networking revolution. Industry adoption of next-generation specifications will provide a substantial boost to the...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

The McGraw-Hill 36-Hour Project Management Course (McGraw-Hill 36-Hour Courses)
The McGraw-Hill 36-Hour Project Management Course (McGraw-Hill 36-Hour Courses)

Project management is today's hottest topic, yet fully integrative, timely, and broad-based coverage is difficult to find. The McGraw-Hill 36-Hour Project Management Course synthesizes and organizes current PM knowledge and material from the Project Management Institute and other leading bodies of knowledge into one comprehensive...

Chromium Doped TiO2 Sputtered Thin Films: Synthesis, Physical Investigations and Applications (SpringerBriefs in Applied Sciences and Technology)
Chromium Doped TiO2 Sputtered Thin Films: Synthesis, Physical Investigations and Applications (SpringerBriefs in Applied Sciences and Technology)

This book presents co-sputtered processes ways to produce chrome doped TiO2 thin films onto various substrates such as quartz, silicon and porous silicon. Emphasis is given on the link between the experimental preparation and physical characterization in terms of Cr content. Moreover, the structural, optical and optoelectronic...

Machine Learning for Adaptive Many-Core Machines - A Practical Approach (Studies in Big Data)
Machine Learning for Adaptive Many-Core Machines - A Practical Approach (Studies in Big Data)

The overwhelming data produced everyday and the increasing performance and cost requirements of applications are transversal to a wide range of activities in society, from science to industry. In particular, the magnitude and complexity of the tasks that Machine Learning (ML) algorithms have to solve are driving the need to devise...

Water and the Future of Humanity: Revisiting Water Security
Water and the Future of Humanity: Revisiting Water Security

This unique, engaging, and highly authoritative volume enlightens readers on changes needed in the way society accesses, provides, and uses water. It further shines a light on changes needed in the way we use food, energy, and other goods and services in relation to water, and offers projections and recommendations, up to 2050, that apply to...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Game Analytics: Maximizing the Value of Player Data
Game Analytics: Maximizing the Value of Player Data

Developing a successful game in today’s market is a challenging endeavor. Thousands of titles are published yearly, all competing for players’ time and attention. Game analytics has emerged in the past few years as one of the main resources for ensuring game quality, maximizing success, understanding player behavior and enhancing...

Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

unlimited object storage image
Result Page: 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy