Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

Microsoft Lync Server 2010 Unleashed
Microsoft Lync Server 2010 Unleashed

This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified...

SyncML: Synchronizing and Managing Your Mobile Data
SyncML: Synchronizing and Managing Your Mobile Data
Effective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a...
Palm webOS
Palm webOS

This is the official guide to building native JavaScript applications for Palm's new mobile operating system, Palm® webOS™. Written by Palm's software chief technology officer along with the Palm webOS development team, Palm webOS provides a complete tutorial on the design principles, architecture, UI, tools, and...

Emerging Business Online: Global Markets and the Power of B2B Internet Marketing
Emerging Business Online: Global Markets and the Power of B2B Internet Marketing

We live in an age of information overload, significantly facilitated by the Internet. Anyone from almost anywhere can send, access, and post information across the globe in a matter of seconds. As applications and technologies continue to evolve, our ability to leverage the Internet will continue to impact the way we work and live.

...

Embedded Software Development with eCos
Embedded Software Development with eCos

In 1997. there were over 100 commercially supported embedded operating systems, none of which had more than a minority share of the overall embedded OS market, not to mention countless thousands of others developed for specific projects (cell phones, radar arrays, networking equipment, etc.) that had no application developer base beyond that...

Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Smart Things: Ubiquitous Computing User Experience Design
Smart Things: Ubiquitous Computing User Experience Design

The world of smart shoes, appliances, and phones is already here, but the practice of user experience (UX) design for ubiquitous computing is still relatively new. Design companies like IDEO and frogdesign are regularly asked to design products that unify software interaction, device design and service design -- which are all the key...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Signals and Systems using MATLAB
Signals and Systems using MATLAB
Although it is hardly possible to keep up with advances in technology, it is reassuring to know that in science and engineering, development and innovation are possible through a solid understanding of basic principles. The theory of signals and systems is one of those fundamentals, and it will be the foundation of much research and...
Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Mobility has become increasingly important for both business and casual users of computing technology. With the widespread adoption of portable computing devices, such as laptops, PDAs, tablet computers, music players, and cell phones, people can have almost constant access to their personal data as well as to information that is shared with...
The Essential Guide to Flex 2 with ActionScript 3.0
The Essential Guide to Flex 2 with ActionScript 3.0
Flex 2 represents something of a revolution in web applications. It is the next evolutionary step of Flash, which has grown from a web animation tool to a powerful enterprise web design and development tool. with nearly 98% of all web browsers and cellular phones running the Flash player needed to use Flash and Flex applications, knowledge of Flex...
unlimited object storage image
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy