Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)
Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)

This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future development of advanced smart grids that operated in a peer-to-peer fashion,...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

Advances in Mobile Robotics: Proceedings of the Eleventh International Conference on Climbing and Walking Robots and the Support Technologies
Advances in Mobile Robotics: Proceedings of the Eleventh International Conference on Climbing and Walking Robots and the Support Technologies
This book provides state-of-the-art scientific and engineering research findings and developments in the area of mobile robotics and associated support technologies. It contains peer-reviewed articles presented at the CLAWAR 2008 conference. Robots are no longer confined to industrial manufacturing environments; rather, a great deal of interest is...
Handbook of Finite Fields (Discrete Mathematics and Its Applications)
Handbook of Finite Fields (Discrete Mathematics and Its Applications)

Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the book uses a uniform style and...

Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)
Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)

This volume conveys some of the surprises, puzzles and success stories in high-dimensional and complex data analysis and related fields. Its peer-reviewed contributions showcase recent advances in variable selection, estimation and prediction strategies for a host of useful models, as well as essential new developments in the field.

...

Grant Writing For Dummies
Grant Writing For Dummies

Learn to:

  • Navigate federal grant databases and apply online for grants
  • Find the most current public and private sector grant opportunities
  • Create strong statements of need
  • Submit applications that meet funders’ expectations

Your comprehensive...

Introduction to Software Process Improvement (Undergraduate Topics in Computer Science)
Introduction to Software Process Improvement (Undergraduate Topics in Computer Science)
The objective of this book is to give an introduction to the software process improvement field to computer science students. The well-known Capability Maturity Model Integration (CMMI1) is used as the vehicle for software process improvement as it has become the de facto standard2 for implementing best practice in software...
Peer to Peer Computing: The Evolution of a Disruptive Technology
Peer to Peer Computing: The Evolution of a Disruptive Technology
Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to...
Recent Advances in Computer Science and Information Engineering: Volume 6 (Lecture Notes in Electrical Engineering)
Recent Advances in Computer Science and Information Engineering: Volume 6 (Lecture Notes in Electrical Engineering)

CSIE 2011 is an international scientific Congress for distinguished scholars engaged in scientific, engineering and technological research, dedicated to build a platform for exploring and discussing the future of Computer Science and Information Engineering with existing and potential application scenarios. The congress has been held twice,...

Advances in Intelligent Informatics (Advances in Intelligent Systems and Computing)
Advances in Intelligent Informatics (Advances in Intelligent Systems and Computing)
The third International Symposium on Intelligent Informatics (ISI-2014) provided a forum for sharing original research results and practical development experiences among experts in the emerging areas of Intelligent Informatics. This edition was co-located with third International Conference on Advances in Computing, Communications...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy