Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Integration as Solution for Advanced Smart Urban Transport Systems: 15th Scientific and Technical Conference “Transport Systems. Theory & Practice ... in Intelligent Systems and Computing (844))
Integration as Solution for Advanced Smart Urban Transport Systems: 15th Scientific and Technical Conference “Transport Systems. Theory & Practice ... in Intelligent Systems and Computing (844))

Methods of advanced data collecting and their analysis, models which help with decision problems as well as technical solutions which improve the integrity of contemporary transport systems at urban area are only some of many problems connected with integration in passenger and freight transport which have been discussed in this...

Semiconductor Modeling:: For Simulating Signal, Power, and Electromagnetic Integrity
Semiconductor Modeling:: For Simulating Signal, Power, and Electromagnetic Integrity

Semiconductor Modeling: For Simulating Signal, Power, and Electromagnetic Integrity assists engineers – both recent graduates and working product designers – in designing high-speed circuits. The authors apply circuit theory, circuit simulation tools, and practical experience to help the engineer...

Enterprise Services with the .NET Framework: Developing Distributed Business Solutions with .NET Enterprise Services
Enterprise Services with the .NET Framework: Developing Distributed Business Solutions with .NET Enterprise Services
Enterprise Services with the .NET Framework is the only book that experienced .NET developers need to learn how to write distributed, service-oriented applications that take full advantage of Microsoft Enterprise Services. Filled with clear, runnable examples in C# (with Visual Basic .NET examples available on the Web), this book will quickly...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

C in Depth
C in Depth
In the third edition of the book C in depth , the authors explain the basics of the programming language while maintaining the integrity and clarity of the programs. The book can be utilized by both beginners and advanced level programmers as a self-evaluation and learning source. There are more than 310 programs with explanations to illustrate...
Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
A comprehensive overview of managing and assessing safety and functionality of ageing offshore structures and pipelines
A significant proportion, estimated at over 50%, of the worldwide infrastructure of offshore structures is in a life extension phase and is vulnerable to ageing processes. This book captures the central
...
Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook is at once eye candy, artistic inspiration, and incomparable technical guidance for intermediate-to-advanced digital imaging professionals, graphic artists, photographers, and just about anyone involved in creating digital images or animations. A visual splendor, this full-color book...
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Calcium Signalling in Cancer
Calcium Signalling in Cancer

Calcium signalling occupies a preeminent position in the signal transduction system of the cell by virtue of its participation in a wide range of physiological functions together with the biological events associated with genetic expression, cell proliferation and apoptosis, as well as cell differentiation and morphogenesis. It is an...

The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure
The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure
Traditional methods for handling spatial data are encumbered by the assumption of separate origins for horizontal and vertical measurements. Modern measurement systems operate in a 3-D spatial environment. The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure offers a new model for handling digital...
IMechE Engineers' Databook
IMechE Engineers' Databook
This significantly updated 2012 edition of the Engineers’Data Book replaces the three successful previous editions published in 1998, 2000 and 2004. Since the data book’s inception, feedback from engineers and students has indicated that, despite the proliferation of technical information in published and...
unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy