Home | Amazing | Today | Tags | Publishers | Years | Search 
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
"I recommend this book to anyone doing 802.15.4 or ZigBee development. It is likely that Eady touches on the platform you are or will be using and it contrasts it well with everything else out there." - William Wong, Electronic Design, August 2007

Since its recent introduction, the ZigBee protocol has created an
...
Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

OFDM Towards Fixed and Mobile Broadband Wireless Access
OFDM Towards Fixed and Mobile Broadband Wireless Access
Presenting the state of the art in broadband wireless access technology, this unique resource methodically presents the fundamentals of OFDM(A) technology--the cornerstone of the next generation of broadband wireless access offerings. In addition, this book succinctly depicts the future landscape of mobile broadband wireless access and the...
Open Source Web Site Construction Kit
Open Source Web Site Construction Kit
Gives readers a comprehensive survey of the best tools for building and maintaining Web sites. Author takes the reader through the process of thinking through and then building an open source Web site. Softcover.

This book gives readers a comprehensive survey of the best tools for building and maintaining Web sites. In a
...
Upgrading Your Home PC
Upgrading Your Home PC
With the Right Resource, Upgrading’s Easier than You Think

Ever feel like PC technologies evolve so quickly that your own machine is out of date just months after you get it? Now you can keep up without taking it to a professional, without getting in trouble, and without buying a new one. Upgrading Your Home...

Intelligent Data Analysis
Intelligent Data Analysis
This monograph is a detailed introductory presentation of the key classes of intelligent data analysis methods. The ten coherently written chapters by leading experts provide complete coverage of the core issues.

The first half of the book is devoted to the discussion of classical statistical issues, ranging from the basic concepts of...

Encyclopedia of Islam & the Muslim World
Encyclopedia of Islam & the Muslim World
A growing number of scholars and pundits have declared that the twenty-first century will be the era of Islam. Such predictions, whether intended in a positive or negative light, err in failing to appreciate the spread and influence of Islam during the past millennium and a half, especially on the continents of Asia and Africa. Nonetheless, events...
Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

Immunological Computation: Theory and Applications
Immunological Computation: Theory and Applications
Over the last decade, the field of immunological computation has progressed slowly and steadily as a branch of computational intelligence. Immunological Computation: Theory and Applications presents up-to-date immunity-based computational techniques. After a brief review of fundamental immunology concepts, the book presents computational models...
Result Page: 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy