Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management

The Definitive Guide to Protecting Enterprise Data

Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...

Anywhere Computing with Laptops: Making Mobile Easier (One-Off)
Anywhere Computing with Laptops: Making Mobile Easier (One-Off)
You bought your Centrino laptop computer because of its ease-of-use and portability. But are you using your laptop to its maximum potential? Anywhere Computing with Laptops: Making Mobile Easier will show you what to expect when buying and configuring your laptop and how to use built-in features such as digital...
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services

If you are involved or getting involved in mobile communication technologies and services, this book is for you. This book explains the different types of mobile telephone technologies and systems from 1st generation digital broadband. It describes the basics of how they operate, the different types of wireless voice, data and information...

Now You Know Treo
Now You Know Treo
Even a smartphone needs a smart user to take advantage of all of its brillianceespecially when that phone is as jam-packed with features as the Treo. To master all of the Treo's phone, email, Internet, photographic, and organizational capabilities, you need this pocket-sized guide! As the only Treo guide authorized by its maker (palmOne), this one...
Pro OpenSSH
Pro OpenSSH

SSH, or Secure Shell, is the de facto standard among users and administrators who wish to establish secure communication between disparate networks. This book is authored by a Fortune 100 system administrator, who will provide you with a highly practical reference for configuring and deploying OpenSSH in your own environment.

Some of the...

Wireless Communications over MIMO Channels: Applications to CDMA and Multiple Antenna Systems
Wireless Communications over MIMO Channels: Applications to CDMA and Multiple Antenna Systems
Mobile radio communications are evolving from pure telephony systems to multimedia
platforms offering a variety of services ranging from simple file transfers and audio and
video streaming, to interactive applications and positioning tasks. Naturally, these services
have different constraints concerning data rate, delay, and
...
Mobile Commerce Applications
Mobile Commerce Applications
Today, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not...
Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.

...

Network+ Exam Prep 2 (Exam Prep N10-003)
Network+ Exam Prep 2 (Exam Prep N10-003)

Attention Network+ Candidates: Stop spending valuable study time sorting through confusing study aids. Network + Exam Prep 2 is the ultimate self-study guide for the Network + exam. Featuring exercises, self-assessments, study strategies, exam tips and notes, this comprehensive guide will help you understand the concepts behind...

Multimedia Content and the Semantic Web: Standards, Methods and Tools
Multimedia Content and the Semantic Web: Standards, Methods and Tools
The emerging idea of the semantic web is based on the maximum automation of the complete knowledge lifecycle processes: knowledge representation, acquisition, adaptation, reasoning, sharing and use.

Text-based based browsers involve a costly information-retrieval process: descriptions are inherently subjective and usage is often confined to...

Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
The Inside Text: Social, Cultural and Design Perspectives on SMS (The Computer Supported Cooperative Work Series)
The Inside Text: Social, Cultural and Design Perspectives on SMS (The Computer Supported Cooperative Work Series)
Mobile phones and the short-text messaging service (SMS or “text”) in particular
are new social phenomena, much marvelled at and much commented upon (See
Brown et al, 2002; Katz & Aakhus, 2002; Ling, 2004). This success is said to be
because mobiles allow new levels of micromanagement in an age of fraught and...
Result Page: 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy