 |
|
|
|
 ProBlogger: Secrets for Blogging Your Way to a Six-Figure IncomeBlogging for dollars — Do you have what it takes?
Here's the place to find out. Problogger.net is where bloggers worldwide go for advice and information on enhancing their blog's presence. Whether you're just starting out or have been blogging for years, learn from two professional bloggers how to turn your passion... |  |  Absolute Beginner's Guide to Personal FirewallsThe Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal... |  |  Multimedia Broadcasting and Multicasting in Mobile NetworksIntroducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals
Efficiency and cost effectiveness within multimedia delivery is fast becoming a hot topic in wireless communications, with mobile... |
|
 PC QUICKSTEPS 2/ELearn instantly from step-by-step graphics!
We know a picture is worth a thousand words--so we went heavy on pictures and light on words in this easy-to-use guide. Color screenshots and brief instructions show you how to manage, customize, and troubleshoot your desktop or laptop PC. Follow along and learn to install and configure... |  |  Wireless Security and Cryptography: Specifications and ImplementationsAs the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which... |  |  Multimedia Content Encryption: Techniques and Applications
How to Design a Secure Multimedia Encryption Scheme
The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or... |
|
Result Page: 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 |