Home | Amazing | Today | Tags | Publishers | Years | Search 
Ad Hoc & Sensor Networks: Theory And Applications
Ad Hoc & Sensor Networks: Theory And Applications
This book introduces a new explanatory cross-layer model specifically designed to understand all aspects of ad hoc and sensor networking, from design through performance issues to application requirements. Future directions, challenges and potential simulation projects are also discussed. The topics included represent a significant portion of...
Computational Intelligence: Methods and Techniques
Computational Intelligence: Methods and Techniques
This book focuses on various techniques of computational intelligence, both single ones and those which form hybrid methods. Those techniques are today commonly applied issues of artificial intelligence, e.g. to process speech and natural language, build expert systems and robots. The first part of the book presents methods of knowledge...
Algorithms and Data Structures: The Basic Toolbox
Algorithms and Data Structures: The Basic Toolbox
Algorithms are at the heart of every nontrivial computer application, and algorithmics is a modern and active area of computer science. Every computer scientist and every professional programmer should know about the basic algorithmic toolbox: structures that allow efficient organization and retrieval of data, frequently used algorithms, and basic...
Windows Server 2008 For Dummies (Computer/Tech)
Windows Server 2008 For Dummies (Computer/Tech)
If you’re curious, but hesitant, about finding your way around Microsoft’s new Windows Server 2008, Windows Server 2008 For Dummies is the book for you. This friendly reference shows you everything you need to know — from installation and deployment to building and running a Windows Server 2008 network.

...

Designing Network Security
Designing Network Security

A practical guide to creating a secure network infrastructure

* Understand basic cryptography and security technologies
* Identify the threats and common attacks to a network infrastructure
* Learn how to create a security policy
* Find out how to recover from a security breach
* Study specific implementation
...

Structures of Participation in Digital Culture
Structures of Participation in Digital Culture
Digital technologies have been engines of cultural innovation, from the virtualization of group networks and social identities to the digital convergence of textural and audio-visual media. User-centered content production, from Wikipedia to YouTube to Open Source, has become the emblem of this transformation, but the changes run deeper and wider...
New Challenges in Applied Intelligence Technologies (Studies in Computational Intelligence)
New Challenges in Applied Intelligence Technologies (Studies in Computational Intelligence)
The field of intelligence technologies covers a variety of computational approaches that are often suggested and inspired by biological systems, exhibiting functional richness and flexibility of natural behavior. This class of technologies consists of such important approaches as data mining algorithms, neural networks, genetic algorithms, fuzzy...
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers,...
Developing IP-Based Services: Solutions for Service Providers and Vendors (The Morgan Kaufmann Series in Networking)
Developing IP-Based Services: Solutions for Service Providers and Vendors (The Morgan Kaufmann Series in Networking)

Offering new services is a great way for your organization to drive traffic and boost revenue, and what better foundation for these services than IP? This much is a given. The difficulty is uniting business and technical perspectives in a cohesive development and deployment process.

Meeting this challenge is the focus of...

The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today's Internet of People gives way to tomorrow's Internet of Things where billions of...
Higher Creativity for Virtual Teams: Developing Platforms for Co-Creation (Premier Reference)
Higher Creativity for Virtual Teams: Developing Platforms for Co-Creation (Premier Reference)
Virtual teams constitute a relatively new knowledge area that has risen from two recent changes: the globalization of industry and markets, and advances in information communication technology tools. Continual technological advancement is set against a backdrop of international mergers, take-overs, and alliances, which invariably leads to more...
Web-to-Host Connectivity
Web-to-Host Connectivity
Nobody can dispute the incredible impact that the Web continues to have on the way in which people work, shop, research, play, and communicate. In the span of just a few short years, enterprises in nearly every industry and market have had to reevaluate the way in which they do business with their business partners and end customers. Having a...
Result Page: 272 271 270 269 268 267 266 265 264 263 262 261 260 259 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy