|
|
|
|
| | Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... | | Topology Control in Wireless Ad Hoc and Sensor NetworksTopology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks.
Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting... |
|
Requirements Engineering for Sociotechnical Systems"The Information Society" that we live in today is largely driven by the products and services that either contain software as a core element, or are themselves software. At the very least, it is likely that most of those same products and services were manufactured with the help of some type of sophisticated software applications.... | | Global Positioning Systems, Inertial Navigation, and IntegrationAn updated guide to GNSS and INS, and solutions to real-world GPS/INS problems with Kalman filtering
Written by recognized authorities in the field, this second edition of a landmark work provides engineers, computer scientists, and others with a working familiarity with the theory and contemporary... | | Modeling for Insight: A Master Class for Business AnalystsPraise for Modeling for Insight
"Most books on modeling are either too theoretical or too focused on the mechanics of programming. Powell and Batt's emphasis on using simple spreadsheet models to gain business insight (which is, after all, the name of the game) is what makes this book stand head and shoulders... |
|
|
|
|
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 |