Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Essential Guide to Telecommunications (5th Edition) (Essential Guides (Prentice Hall))
The Essential Guide to Telecommunications (5th Edition) (Essential Guides (Prentice Hall))

A Completely Revised Bestseller with an Updated Industry Overview and New Coverage of Mobile Networks, LTE, Spectrum, Cloud Computing, and More!

 

The #1 Telecom Guide for Businesspeople and Nontechnical Professionals, Fully Updated for Cloud...

Computer Security for the Home and Small Office
Computer Security for the Home and Small Office

Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene.

The book offers...

Facebook For Dummies
Facebook For Dummies

Facebook connects you with the people you know and care about. It enables you to communicate, stay up-to-date, and keep in touch with friends and family anywhere. It facilitates your relationships online to help enhance them in person. Specifically, Facebook connects you with the people you know around content that is important to you....

Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Quantum Cryptography and Secret-Key Distillation
Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques of quantum cryptography, including secret-key distillation, as well as some more advanced topics. As quantum cryptography is now becoming a practical reality with products available commercially, it is important to focus not only on the theory of quantum...
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.

The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following
...
Wireless Data Demystified (Mcgraw-Hill Demystified Series)
Wireless Data Demystified (Mcgraw-Hill Demystified Series)
UNDERSTAND WIRELESS DATA COMPLETELY, EASILY WITH WIRELESS DATA DEMYSTIFIED

Wireless subscribers are up, but revenue per subscriber isn’t – and it isn’t going to be unless wireless service providers can provide more than plain-vanilla voice services. The road to successful deployment of data services...

Personalization Techniques And Recommender Systems
Personalization Techniques And Recommender Systems

The phenomenal growth of the Internet has resulted in the availability of huge amounts of online information, a situation that is overwhelming to the end-user. To overcome this problem personalization technologies have been extensively employed across several domains to provide assistance in filtering, sorting, classifying and sharing...

Learning iOS Security
Learning iOS Security

Enhance the security of your iOS platform and applications using iOS-centric security techniques

About This Book

  • Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
  • Resolve common vulnerabilities and security-related shortcomings in iOS...
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

Python Penetration Testing Essentials
Python Penetration Testing Essentials

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • ...
Windows 10 Guidebook: A tour into the future of computing
Windows 10 Guidebook: A tour into the future of computing

Windows 10 is really easy to use with this guide – for Windows insiders upgrading from Windows 7 or 8.1 to Windows 10, as well as for first-time users that want to learn about the operating system basics. 
Chapters 1 and 2 present the new and changed features in Windows 10. Furthermore, we describe what you have to watch
...

unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy