Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
How to Do Everything with Windows XP
How to Do Everything with Windows XP
Get the most out of Windows XP using this friendly, solutions-oriented guide. See how much you can do with the world’s most popular operating system--including making movies and playing music--and learn about all its new updates such as networking for both home and office, faster boot features, better security, and improved Web browsing....
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role-based access control (RBAC) promises to provide several benefits to organizations. These benefits include simplified security provisioning and administration, ease of reporting on privileges and to whom they are available, and finer grained security authorization. By being policy-neutral, RBAC can be used to enforce the variety of access...
Learning OpenVPN 2.0.9
Learning OpenVPN 2.0.9

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL...

The Facebook Guide for People Over 50
The Facebook Guide for People Over 50

The Facebook guide for people over 50

People over 50 are the fastest-growing segment of the Facebook population, and they have some unique interests and concerns. This one-of-a-kind guide addresses issues of specific interest to older generations, helping them create a profile, connect with old friends and relatives,...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

The Outlook Answer Book: Useful Tips, Tricks, and Hacks for Microsoft Outlook 2003
The Outlook Answer Book: Useful Tips, Tricks, and Hacks for Microsoft Outlook 2003

Discover many useful customizations you can do with Outlook to improve efficiency both at home and on the job.

Get more out of Outlook! The Outlook Answer Book brings together hundreds of bite-size tips and tricks for saving time, using Outlook more efficiently,...

Design Representation
Design Representation
There can be no design activity without representation. Ideas must be represented if
they are to be shared with others, even shared with oneself! Different representational
modes and strategies afford distinctive opportunities for reading or for transforming
design ideas. We believe Design Thinking Research must address these and...
Network Security Hacks: Tips & Tools for Protecting Your Privacy
Network Security Hacks: Tips & Tools for Protecting Your Privacy

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and...

Data Strategy
Data Strategy
The definitive best-practices guide to enterprise data-management strategy.You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information.In this book, three...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy