Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile and Wireless Network Security and Privacy
Mobile and Wireless Network Security and Privacy

Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. Major security and privacy issues for standard wireless networks include the authentication of wireless clients and...

Materialized Views: Techniques, Implementations, and Applications
Materialized Views: Techniques, Implementations, and Applications

Materialized views have recently seen a renewed interest in the research and commercial communitites because of their applications in warehousing, retailing, billing, visualization, integrity constraints, query optimization, and decision support. All leading database vendors are currently implementing in their systems materialized views...

Multimedia over IP and Wireless Networks: Compression, Networking, and Systems
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems

This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overview of the fundamental principles and...

Windows Small Business Server 2011 Administrator's Companion
Windows Small Business Server 2011 Administrator's Companion

If you run a small business, you don’t need us to tell you that the highly competitive marketplace, unpredictable economic cycles, time pressures, and technological demands are constantly exerting pressure on your bottom line.

Your business needs the same technologies that large companies do. You need the...

Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

The present book 1 provides a rigorous treatment and coherent presentation of the consolidated results of the authors' work, over the past four years, on the employment of logic programming as a representational and reasoning tool. It comes out of a background of a world-wide research effort for at least the past six years on the...

Enterprise JavaBeans (Java Series)
Enterprise JavaBeans (Java Series)
This book is about Enterprise JavaBeans 1.1 and 2.0 the second and third versions of the Enterprise JavaBeans specification. Just as the Java platform has revolutionized the way we think about software development, Enterprise JavaBeans has revolutionized the way we think about developing mission-critical enterprise...
Geeks and Geezers
Geeks and Geezers
We were drawn to thinking and then ultimately writing about geeks and geezers from very different starting points. Coauthoring a book isn’t quite like synchronized swimming. It’s more like gaining perspective and depth through incongruity. Through writing and arguing in what seemed like endless and percussive...
Oracle Core: Essential Internals for DBAs and Developers
Oracle Core: Essential Internals for DBAs and Developers

When I wrote Practical Oracle 8i, there was a three-week lag between publication and the first e-mail asking me when I was going to produce a 9i version of the book—thanks to Larry Ellison’s timing of the

launch of 9i. That question has been repeated many times (with changes in version number) over the last 12
...
IT Audit, Control, and Security (Wiley Corporate F&A)
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has changed in information technology (IT) auditing since we published our first edition of this book when we were then called Computer Auditors. Back in those days, traditional mainframe or legacy computer systems were still common, we had difficulty envisioning...
Introduction to Hardware Security and Trust
Introduction to Hardware Security and Trust
As technology feature size of devices and interconnects shrink at the rate predicted by Moore’s law, gate density and design complexity on single integrated chip (IC) keep increasing in recent decades. The close to nanoscale fabrication process introduces more manufacturing errors. New failure mechanisms that are not covered...
Foundation Website Creation with HTML5, CSS3, and JavaScript
Foundation Website Creation with HTML5, CSS3, and JavaScript

Foundation Website Creation with HTML5, CSS3, and JavaScript shows the entire process of building a website. This process involves much more than just technical knowledge, and this book provides all the information you'll need to understand the concepts behind designing and developing for the Web, as well as the best means...

Android Apps Security
Android Apps Security

Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps.

This book will provide developers with the
...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy