Home | Amazing | Today | Tags | Publishers | Years | Search 
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

Internal Audit: Efficiency Through Automation
Internal Audit: Efficiency Through Automation
Internal Audit

Efficiency through Automation

Increased globalization of businesses, market pressure to improve operations, and rapidly changing business conditions are creating demand for technology-enabled auditing (TEA) to ensure timely ongoing assurance that controls are working effectively and that risk is properly...

Topology Control in Wireless Sensor Networks: with a companion simulation tool for teaching and research
Topology Control in Wireless Sensor Networks: with a companion simulation tool for teaching and research
The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life applications. It is common to see how this technology is being applied in irrigation systems, intelligent buildings, bridges, security mechanisms,...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
The Evolution of Hominin Diets: Integrating Approaches to the Study of Palaeolithic Subsistence
The Evolution of Hominin Diets: Integrating Approaches to the Study of Palaeolithic Subsistence
This volume brings together new and important research from the top experts in hominid diets across multiple fields. The objective of the volume is to explore if there is a consensus between the different methods, allowing us to better understand the nature of hominin dietary strategies through time. Contributions focus on modern studies, faunal...
Image Processing for Computer Graphics and Vision (Texts in Computer Science)
Image Processing for Computer Graphics and Vision (Texts in Computer Science)
Image processing is concerned with the analysis and manipulation of images by computer. Providing a thorough treatment of image processing, with an emphasis on those aspects most used in computer graphics and vision, this fully revised second edition concentrates on describing and analyzing the underlying concepts of this subject.

 

...
FreeBSD Corporate Networker's Guide (With CD-ROM)
FreeBSD Corporate Networker's Guide (With CD-ROM)

"FreeBSD has been the secret weapon of serious network administrators for many years now and this book should provide a welcome introduction to those who have yet to discover it for themselves."
--Jordan Hubbard, Co-founder, The FreeBSD Project

FreeBSD is the engine that runs on some...

Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Balanced Scorecards & Operational Dashboards with Microsoft Excel
Balanced Scorecards & Operational Dashboards with Microsoft Excel

Created in Excel, balanced scorecards enable you to monitor operations and tactics, while operational dashboards is a set of indicators regarding the state of a business metric or process—both features are in high demand for many large organizations. This book serves as the first guide to focus on combining the benefits of balanced...

Handbook of Granular Computing
Handbook of Granular Computing
Although the notion is a relatively recent one, the notions and principles of Granular Computing (GrC) have appeared in a different guise in many related fields including granularity in Artificial Intelligence, interval computing, cluster analysis, quotient space theory and many others. Recent years have witnessed a renewed and expanding interest...
Lighting Technology, Second Edition
Lighting Technology, Second Edition
Anyone working with lighting in the entertainment industries will find this an immensely readable source of information. The authors, themselves experienced lighting practitioners, have collected a wealth of essential lighting technology and data into one comprehensive reference volume in an accessible, jargon-free style.

The new edition
...
Result Page: 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy