 |
|
|
 |  |  Understanding Cryptography: A Textbook for Students and PractitionersCryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a... |  |  Tomcat 6 Developer's GuideWhile Tomcat is one of the most popular servlet containers, its inner workings still remain a mystery to many developers. If you only have a superficial familiarity of how this container actually functions, much of its power remains untapped and underutilized. This book will provide you with all that you need to undertand how to effectively use... |
|
 Audio Over IP: Building Pro AoIP Systems with LivewirePosition yourself at the forefront of audio and broadcast studio technology by learning audio over IP. You will gain knowledge of IP network engineering as it applies to audio applications, and then progress to a full understanding of how equipment built on Ethernet and Internet Protocol are used in today's audio production and broadcast... |  |  Modeling and Verification of Real-time SystemsThis title is devoted to presenting some of the most important concepts and techniques for describing real-time systems and analyzing their behavior in order to enable the designer to achieve guarantees of temporal correctness.
Topics addressed include mathematical models of real-time systems and associated formal verification techniques... |  |  Brownfield Application Development in .Net
Most software developers have inherited legacy or brownfield projects that require maintenance, incremental improvements, or even cleaning up the mess another programmer left behind.
Brownfield Application Development in .NET shows developers how to approach legacy applications with the state-of-the-art concepts, patterns, and... |
|
 Under Control: Governance Across the EnterpriseWith the economic crisis that began in 2008, a long-standing trend toward increased regulation is becoming a flood. The clamor for improved enterprise risk management and the complexity of multinational compliance present executives with a dramatically new array of challenges.
Governance should offer solutions, but it is clear that... |  |  Communications Systems and NetworksPacked with diagrams and illustrations, Communications & Systems delivers plain-English explanations of all the technical fundamentals -- and puts everything in context by addressing standards, regulations, and the real-world outlook for legacy, contemporary, and emerging technologies. In this unique overview, Ray Horak lucidly... |  |  Microsoft SQL Server 2008 Analysis Services UnleashedAs the foundation of the Microsoft Business Intelligence Strategy, Microsoft SQL Server 2008 Analysis Services provides users with faster access to data and even more tools for managing and analyzing data across multidimensional objects (databases, dimensions, cubes).
... |
|
Result Page: 804 803 802 801 800 799 798 797 796 795 794 793 792 791 790 789 788 787 786 |