 |
|
 |  |  Intelligent Control Systems Using Soft Computing MethodologiesIn recent years, intelligent control has emerged as one of the most active and fruitful areas of research and development. Until now, however, there has been no comprehensive text that explores the subject with focus on the design and analysis of biological and industrial applications. Intelligent Control Systems Using Soft Computing Methodologies... |  |  Internet SimplifiedThe content boom on the Internet has been explosive in the past few years with more than a billion people surfing worldwide. Internet Simplified shows beginning level computer users how to get comfortable surfing the web and how to navigate the flood of information once they find what they're looking for. Users will find helpful information on the... |
|
|
 Open Source E-mail Security (Kaleidoscope)In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping... |  |  Search Engine Optimization For Dummies (Computer/Tech)"…cuts through the nonsense, providing a clear, simple and concise explanation of how websites reach top positions in search engines ..." (PC Advisor, September 2006)
Why do some sites pop to the top when you search? How do you make yours one of them? You create sites that make search... |  |  Understanding Telephone Electronics, Fourth Edition (Newnes)Covers conventional telephone fundamentals! Explores how telephone systems operate and how digital electronics replace them. "Introduces state-of-the-art speech circuits, dialing, ringing, and central office electronics. Dissects modems and digital transmission techniques. Studies microcomputers and cellular phones. Helps readers increase... |
|
 Computer Forensics: Computer Crime Scene Investigation (Networking Series)The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package... |  |  MacBook For Dummies (Computer/Tech)Got a new MacBook, MacBook Air, or MacBook Pro? Want the scoop on Mac laptop basics, using Mac OS X Leopard, networking a laptop, or connecting your laptop to wireless devices? There’s no better place to find what you need than MacBook For Dummies, 2nd Edition!
With your Mac laptop, you can take your movies, music,... |  |  Windows Server 2008 PKI and Certificate Security (PRO-Other)Get in-depth guidance for designing and implementing certificate-based security solutions straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and... |
|
Result Page: 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 |