Home | Amazing | Today | Tags | Publishers | Years | Search 
Building A Global Information Assurance Program
Building A Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are...
The Semantic Web - ISWC 2004: Third International Semantic Web Conference, Hiroshima, Japan, November 7-11, 2004. Proceedings
The Semantic Web - ISWC 2004: Third International Semantic Web Conference, Hiroshima, Japan, November 7-11, 2004. Proceedings
This book constitutes the refereed proceedings of the Third International Semantic Web Conference, ISWC 2004, held in Hiroshima, Japan in November 2004.

The 55 revised full papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from a total of 227 submitted papers. The papers are organized in topical...

RFID Technology and Applications
RFID Technology and Applications
This book is addressed to business management and project managers as well as researchers who are evaluating the use of radio frequency identification (RFID) for tracking uniquely identified objects. In an effort to make RFID project management less of an art form and more of a science RFID Technology and Applications brings together pioneering...
F. Scott Barker's Microsoft Access 2002 Power Programming (Kaleidoscope)
F. Scott Barker's Microsoft Access 2002 Power Programming (Kaleidoscope)
F. Scott Barker's Access 2002 Power Programming gives many practical techniques for the corporate and independent developer.

The main topics covered are:

  • The Root of Power Programming;
  • Manipulating and Presenting Data;
  • Extending Access with Interoperability;
  • Adding the...
Middleware for Communications
Middleware for Communications
"The book addresses telecommunications workers, developers, middleware researchers, software engineers, and software architects." (IT Professional, July/August 2004)

A state-of-the-art guide to middleware technologies, and their pivotal role in communications networks.

Middleware is...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
PacketCable Implementation (Networking Technology)
PacketCable Implementation (Networking Technology)
PacketCable networks use IP technology to enable a wide range of multimedia services, from IP telephony to interactive gaming and beyond. Because PacketCable-based business and residential services are central to the cable industry's strategy for growth, the industry's need for PacketCable expertise is expected to increase dramatically. ...
Technologies for Home Networking
Technologies for Home Networking
A broad overview of the home networking field, ranging from wireless technologies to practical applications

In the future, it is expected that private networks (e.g., home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP-based services, and possibly becoming service providers...

Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
"I commend this book to you as your springboard to the future of how to make the Net work."
-from the Foreword by Simon Phipps, Chief Technology Evangelist, Sun Microsystems, Inc.

This hands-on developer's guide to Web services prepares you for the next level of distributed computing. The authors clearly show
...
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
Bluetooth Application Programming with the Java APIs Essentials Edition (The Morgan Kaufmann Series in Networking)
Bluetooth Application Programming with the Java APIs Essentials Edition (The Morgan Kaufmann Series in Networking)
Bluetooth wireless technology is a short-range radio standard that provides new opportunities for wireless devices. Originally, Bluetooth wireless technology was designed as a way of eliminating the cables attached to nearly all consumer electronic devices. However, the goals for Bluetooth wireless technology grew as its designers recognized that...
Managing and Mining Multimedia Databases
Managing and Mining Multimedia Databases
Reading Data Mining by Bhavani Thuraisingham is a poignant experience masterful and readable summary of her field...a profound overview of an important domain of human knowledge a memorable opus.
-Dr. Dobb's Journal

There is now so much data on the Web that managing it with conventional tools is becoming almost
...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy