Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Managing IP Networks: Challenges and Opportunities (IEEE Press Series on Network Management)
Managing IP Networks: Challenges and Opportunities (IEEE Press Series on Network Management)

An essential resource on the future of IP networks

Everyone agrees that Internet Protocol (IP) has played and will play a major role in the evolution of networks and services. The exact nature and scope of that role, however, remains a point of discussion. Assembling the foremost experts in their respective fields, editors Salah...

Software Testing and Quality Assurance: Theory and Practice
Software Testing and Quality Assurance: Theory and Practice
A superior primer on software testing and quality assurance, from integration to execution and automation

This important new work fills the pressing need for a user-friendly text that aims to provide software engineers, software quality professionals, software developers, and students with the fundamental developments in testing theory and...

High Performance Computing on Vector Systems 2005: Proceedings of the High Performance Computing Center Stuttgart, March 2005
High Performance Computing on Vector Systems 2005: Proceedings of the High Performance Computing Center Stuttgart, March 2005
In March 2005 about 40 scientists from Europe, Japan and the US came together the second time to discuss ways to achieve sustained performance on supercomputers in the range of Teraflops. The workshop held at the High Performance Computing Center Stuttgart (HLRS) was the second of this kind. The first one had been held in May 2004. At both...
Audel Electrical Course for Apprentices and Journeymen, All New Fourth Edition
Audel Electrical Course for Apprentices and Journeymen, All New Fourth Edition
An apprentice electrician prepares to become a journeyman typically
during a four-year period. These four years include 2000
hours per year of on-the-job training, or a total of 8000 hours.
During off-hours an apprentice studies electrical theory, methods,
equipments, and the NEC.

My purpose in writing this book was
...
Designing Embedded Processors: A Low Power Perspective
Designing Embedded Processors: A Low Power Perspective
As we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.

Increasingly, these systems have to consume little energy....

Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Basic NEC with Broadcast Applications
Basic NEC with Broadcast Applications
The development of computer programs for modeling antennas began in the 1960s when main-frame computers were making advancements. Modeling codes that could run on desktop computers made their appearance in the early 1980s. The design of directional antenna arrays for medium-frequency (MF) broadcasting stations has a much longer history, however,...
Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital...
Large-Scale Kernel Machines (Neural Information Processing series)
Large-Scale Kernel Machines (Neural Information Processing series)

Pervasive and networked computers have dramatically reduced the cost of collecting and distributing large datasets. In this context, machine learning algorithms that scale poorly could simply become irrelevant. We need learning algorithms that scale linearly with the volume of the data while maintaining enough statistical efficiency to...

National Electrical Code  2008 (National Fire Protection Association National Electrical Code)
National Electrical Code 2008 (National Fire Protection Association National Electrical Code)
The world’s most widely adopted safety code, the National Electrical Code® (NEC) is now advancing electrical safety requirements with the 2008 edition in an effort to maximize public safety, emergency preparation, and electrical worker protection. With regulations for electrical wiring and equipment in virtually all types of buildings,...
unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy