Home | Amazing | Today | Tags | Publishers | Years | Search 
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

Deductive Databases and Their Applications
Deductive Databases and Their Applications
Deductive Databases and their Applications is an introductory text aimed at undergraduate students with some knowledge of database and information systems. The text comes complete with exercises and solutions to encourage students to tackle problems practically as well as theoretically. The author presents the origins of deductive databases in...
Advanced Error Control Techniques for Data Storage Systems
Advanced Error Control Techniques for Data Storage Systems
With the massive amount of data produced and stored each year, reliable storage and retrieval of information is more crucial than ever. Robust coding and decoding techniques are critical for correcting errors and maintaining data integrity. Comprising chapters thoughtfully selected from the highly popular Coding and Signal Processing for Magnetic...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)

This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent...

Guidelines for Human Embryonic Stem Cell Research
Guidelines for Human Embryonic Stem Cell Research
(National Research Council and Institute of Medicine) Presents the Committee on Guidelines for Human Embryonic Stem Cell Research's findings and recommendations. The guidelines are intended to enhance the integrity of privately funded research and covers the ethical concerns surrounding hES cell research and what scientists can do to...
Smart Technologies for Safety Engineering
Smart Technologies for Safety Engineering
Smart technologies comprise a dynamic new interdisciplinary research field that encompasses a wide spectrum of engineering applications including, but not limited to, intelligent structures and materials, actuators, sensors and structural observability, control systems and software tools for the design of adaptive structures. Smart technologies...
Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications

How to Design a Secure Multimedia Encryption Scheme

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...

Design and Use of Relational Databases in Chemistry
Design and Use of Relational Databases in Chemistry
Design and Use of Relational Databases in Chemistry helps programmers and users improve their ability to search and manipulate chemical structures and information, especially when using chemical database “cartridges”. It illustrates how the organizational, data integrity, and extensibility properties of relational...
Nano-CMOS Design for Manufacturability: Robust Circuit and Physical Design for Sub-65nm Technology Nodes
Nano-CMOS Design for Manufacturability: Robust Circuit and Physical Design for Sub-65nm Technology Nodes
This book is the sequel to Nano-CMOS Circuit and Physical Design, taking design to technology nodes beyond 65nm geometries. It examines the challenges that design engineers face in the nano-scaled era, such as exacerbated effects and the proven design for manufacturability (DFM) methodology in the midst of increasing variability and design process...
Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP shows non-programmers how Access databases can be created, managed, and customized with Visual Basic for Applications (VBA) -- a powerful programming language built into Access. Hundreds of hands-on examples and projects throughout the book show users how to take charge of their Access...
The Physics of Coronary Blood Flow (Biological and Medical Physics, Biomedical Engineering)
The Physics of Coronary Blood Flow (Biological and Medical Physics, Biomedical Engineering)
Coronary blood flow is blood flow to the heart for its own metabolic needs. In the most common form of heart disease there is a disruption in this flow because of obstructive disease in the vessels that carry the flow. The subject of coronary blood flow is therefore associated mostly with the pathophysiology of this disease, rarely with dynamics or...
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy