Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Architecture: Software Aspects, Coding, and Hardware
Computer Architecture: Software Aspects, Coding, and Hardware
After having published my first book, Computer Networks: Architecture, Protocols, and Software, friends asked me how long it took to write the book. My reply was that on the surface it took about three years from beginning to end; below the surface it took more like thirty years. Yet, my job is not done unless I write a book on computer...
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
A common misconception in the Mac community is that the Mac is more secure than any other operating system on the market. Although this might be true in most side-by-side analyses of security features right out of the box, what this isn’t taking into account is that security tends to get overlooked once the machine starts to be configured for...
Advances in Nonlinear Signal and Image Processing (EURASIP Book Series on Signal Processing and Communications)
Advances in Nonlinear Signal and Image Processing (EURASIP Book Series on Signal Processing and Communications)
The interest in nonlinear methods in signal processing is steadily increasing, since nowadays the advances in computational capacities make it possible to implement sophisticated nonlinear processing techniques which in turn allow remarkable improvements with respect to standard and well-consolidated linear processing approaches.

The aim of the...

Handbook of Research on Wireless Security
Handbook of Research on Wireless Security
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to...
Multicast Sockets: Practical Guide for Programmers (The Practical Guides)
Multicast Sockets: Practical Guide for Programmers (The Practical Guides)

Multicast Sockets: Practical Guide for Programmers is a hands-on, application-centric approach to multicasting (as opposed to a network-centric one) that is filled with examples, ideas, and experimentation. Each example builds on the last to introduce multicast concepts, frameworks, and APIs in an engaging manner that does not burden...

IP Multicast with Applications to IPTV and Mobile DVB-H
IP Multicast with Applications to IPTV and Mobile DVB-H

Get a clear picture of IP Multicast applications for delivering commercial high-quality video services

This book provides a concise guide to current IP Multicast technology and its applications, with a focus on IP-based Television (IPTV) and Digital Video Broadcast-Handheld (DVB-H) applications—areas of tremendous commercial...

Designing Network Security
Designing Network Security

A practical guide to creating a secure network infrastructure

* Understand basic cryptography and security technologies
* Identify the threats and common attacks to a network infrastructure
* Learn how to create a security policy
* Find out how to recover from a security breach
* Study specific implementation
...

Algorithms and Data Structures: The Basic Toolbox
Algorithms and Data Structures: The Basic Toolbox
Algorithms are at the heart of every nontrivial computer application, and algorithmics is a modern and active area of computer science. Every computer scientist and every professional programmer should know about the basic algorithmic toolbox: structures that allow efficient organization and retrieval of data, frequently used algorithms, and basic...
Windows Server 2008 For Dummies (Computer/Tech)
Windows Server 2008 For Dummies (Computer/Tech)
If you’re curious, but hesitant, about finding your way around Microsoft’s new Windows Server 2008, Windows Server 2008 For Dummies is the book for you. This friendly reference shows you everything you need to know — from installation and deployment to building and running a Windows Server 2008 network.

...

Computational Intelligence: Methods and Techniques
Computational Intelligence: Methods and Techniques
This book focuses on various techniques of computational intelligence, both single ones and those which form hybrid methods. Those techniques are today commonly applied issues of artificial intelligence, e.g. to process speech and natural language, build expert systems and robots. The first part of the book presents methods of knowledge...
Structures of Participation in Digital Culture
Structures of Participation in Digital Culture
Digital technologies have been engines of cultural innovation, from the virtualization of group networks and social identities to the digital convergence of textural and audio-visual media. User-centered content production, from Wikipedia to YouTube to Open Source, has become the emblem of this transformation, but the changes run deeper and wider...
Linux Networking Cookbook
Linux Networking Cookbook
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean...
Result Page: 272 271 270 269 268 267 266 265 264 263 262 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy