Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Computing Handbook
Mobile Computing Handbook
The debut of small, inexpensive, yet powerful portable computers has coincided with the exponential growth of the Internet, making it possible to access computing resources and information at nearly any location at almost any time. This new trend, mobile computing, is poised to become the main technology driver for a decade to come. There are many...
Wireless Network Security (Signals and Communication Technology)
Wireless Network Security (Signals and Communication Technology)
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the...
A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a renowned expert in the field, this book offers readers a succinct, reader-friendly foundation to the chief approaches, methods and techniques currently employed in the field of data compression.

Part I presents the basic...

Variable-length Codes for Data Compression
Variable-length Codes for Data Compression
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties - such as those containing certain bit patterns, or those that are robust - and these can be useful. This book brings this large set of codes to the attention of...
Resolving Ethical Dilemmas: A Guide for Clinicians
Resolving Ethical Dilemmas: A Guide for Clinicians
Every day clinicians face ethical dilemmas, many of which result from medical advances and challenges in managed care. How practitioners resolve these challenges has a direct impact on patient care. This timely Third Edition will keep you up to date on a wide range of ethical dilemmas and new ways of thinking about them. Highlights of this edition...
Advances in Biometrics: Sensors, Algorithms and Systems
Advances in Biometrics: Sensors, Algorithms and Systems

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. From simply logging on to a laptop to crossing the border of a country, biometrics is being called upon to meet the growing challenges of identity management.

With contributions from academia and...

Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
The 18th Tyrrhenian Workshop on digital communications is devoted to wireless communications. In the last decade, wireless communications research boosted launching new standards and proposing new techniques for the access technology. We moved from the UTRA standard capable to transmit 0.5 bit/s/Hz to WLAN which is promising 2.7 bit/s/Hz. Now...
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007.

The book includes 17 revised full papers, 1 system...

XML Web Services in the Organization
XML Web Services in the Organization

Discover how you can use XML-based Web services to dramatically improve the data sharing and communication capabilities in your organization. This pragmatic guide teaches you how to exploit the interoperability features of the Microsoft .NET Framework to build highly available, platform-independent Web services. Easy-to-follow sample...

eBay Bargain Shopping for Dummies
eBay Bargain Shopping for Dummies

Shop whenever you want, save money, and protect your privacy

What you need to know to find a treasure, bid in an auction – even buy a timeshare

You can buy everything from beanies to Buicks on eBay – if you know how and where to look. So grab this book before you bid! The leading eBay maven tells you where to...

Ethics and Law for School Psychologists
Ethics and Law for School Psychologists
This completely updated edition of the leading ethics and law guide for students, as well as practicing school psychologists, provides authoritative, timely information on professional standards and legal requirements pertinent to the delivery of school psychological services. Ethics and Law for School

Psychologists, Fourth Edition covers a...

A Professional's Guide To Data Communication In a TCP/IP World
A Professional's Guide To Data Communication In a TCP/IP World
Resource provides a comprehensive picture of the Internet protocol stack and the role of TCP/IP in data communications. Offers a thorough understanding of advanced LAN and WAN technologies, an integrated view of bridging operations, and how to ensure privacy with virtual LAN. DLC: TCP/IP...
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy