Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing IP Networks: Challenges and Opportunities (IEEE Press Series on Network Management)
Managing IP Networks: Challenges and Opportunities (IEEE Press Series on Network Management)

An essential resource on the future of IP networks

Everyone agrees that Internet Protocol (IP) has played and will play a major role in the evolution of networks and services. The exact nature and scope of that role, however, remains a point of discussion. Assembling the foremost experts in their respective fields, editors Salah...

Coverage Control in Sensor Networks (Computer Communications and Networks)
Coverage Control in Sensor Networks (Computer Communications and Networks)

This easy-to-read text focuses on challenges in coverage control in sensor networks, examines fundamental coverage problems, and presents the most recent advances and techniques in the field. Features: provides an introduction to sensors, sensor nodes, sensor networks, and sensor coverage models; supplies an informal definition and taxonomy for...

Wirelessness: Radical Empiricism in Network Cultures
Wirelessness: Radical Empiricism in Network Cultures

Motion, to take a good example, is originally a turbid sensation, of which the native shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)

Between 1999 and 2009, a “ turbid ” or disordered sensation of change was felt as wireless connections expanded and eroded the edges of the Internet...

Rules of Play: Game Design Fundamentals
Rules of Play: Game Design Fundamentals
For hundreds of years, the field of game design has drifted along under the radar of culture, producing timeless masterpieces and masterful time-wasters without drawing much attention to itself-without, in fact, behaving like a "field" at all. Suddenly, powered by the big bang of computer technology, game design has...
Apache CloudStack Cloud Computing
Apache CloudStack Cloud Computing

Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.

Overview

  • Install, deploy, and manage a cloud service using...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Universal Serial Bus (USB) is one of the most important developments in PC peripheral interconnect technology since the introduction of serial and parallel ports in the early 1980's. It is fast becoming the port of choice for many new digital video conferencing cameras, scanners, monitors, PC telephony equipment, and Human Interface Devices such as...
Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
This book represents a milestone in the synthesis of temporal and spatial database concepts and techniques. It unifies and organizes the existing research into a coherent whole and presents substantial new results and approaches in many areas. In each case it begins with what is known, then it introduces the new concepts in an abstract and...
Web 2.0: The Business Model
Web 2.0: The Business Model
Web 2.0 is one of the most prominent business models for information systems available today. It brings together technology and social networks, and the interactivity that creates business value.

Web 2.0: The Business Model, an edited volume, is the first reference that integrates the business implications of Web 2.0/3.0, along...

Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009
Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale...

unlimited object storage image
Result Page: 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy