Home | Amazing | Today | Tags | Publishers | Years | Search 
WiMAX: Taking Wireless to the MAX
WiMAX: Taking Wireless to the MAX
With market value expected to reach $5 billion by 2007 and the endorsement of some of the biggest names in telecommunications, World Interoperability for Microwave Access (WiMAX) is poised to change the broadband wireless landscape. But how much of WiMAX's touted potential is merely hype? Now that several pre-WiMAX networks have been deployed, what...
Advances in Fuzzy Clustering and its Applications
Advances in Fuzzy Clustering and its Applications

A comprehensive, coherent, and in depth presentation of the state of the art in fuzzy clustering.

Fuzzy clustering is now a mature and vibrant area of research with highly innovative advanced applications. Encapsulating this through presenting a careful selection of research contributions, this book...

Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
Applescript Scripting Additions Guide (ATL)
Applescript Scripting Additions Guide (ATL)
Since 1985, Apple and Addison-Wesley have been publishing authoritative books about Apple technologies. The Apple Technical Library provides Macintosh developers with the official treatment of all the major new technologies that Apple releases. Timely, accurate, and clear, this collection of books is the essential resource for...
Linux For Dummies 8th Edition
Linux For Dummies 8th Edition

Everything you need to install, run, and optimize Linux on your desktop

Here's how to start using Linux, the popular and free operating system

Want to do the same tasks you can with Windows, except for free? Linux is the alternative open source operating system that's beloved by users...

CCNP Switching Study Guide (Exam 640-504 with CD-ROM)
CCNP Switching Study Guide (Exam 640-504 with CD-ROM)
Here's the book you need to prepare for Cisco's new Switching exam, 640-604. Written by Cisco internetworking experts who can help you master the skills and acquire the knowledge needed to approach the test with confidence, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official exam...

Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect...
Artificial Intelligence and Soft Computing -- ICAISC 2004: 7th International Conference, Zakopane, Poland, June 7-11, 2004
Artificial Intelligence and Soft Computing -- ICAISC 2004: 7th International Conference, Zakopane, Poland, June 7-11, 2004
This book constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Soft Computing, ICAISC 2004, held in Zakopane, Poland in June 2004.

The 172 revised contributed papers presented together with 17 invited papers were carefully reviewed and selected from 250 submissions. The papers are organized in...

Network Analysis: Methodological Foundations (Lecture Notes in Computer Science)
Network Analysis: Methodological Foundations (Lecture Notes in Computer Science)
‘Network’ is a heavily overloaded term, so that ‘network analysis’ means different things to different people. Specific forms of network analysis are used in the study of diverse structures such as the Internet, interlocking directorates, transportation systems, epidemic spreading, metabolic pathways, the Web graph,...
How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Testing Applications on the Web: Test Planning for Internet-Based Systems
Testing Applications on the Web: Test Planning for Internet-Based Systems

A software testing survival guide for those who work in Internet time With Internet applications spreading like wildfire, the field of software testing is increasingly challenged by the brave new networked world of e-business. This book brings you up to speed on the technologies, testing concepts, and tools youll need to run e-business...

Business Continuity and Disaster Recovery Planning for IT Professionals
Business Continuity and Disaster Recovery Planning for IT Professionals
Increase Your Companys Odds of Surviving a Major Disaster

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a
...
Result Page: 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy