Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

RFID for the Optimization of Business Processes
RFID for the Optimization of Business Processes
Prof. Elgar Fleisch, ETH Zürich and University of St. Gallen:

"A comprehensive, clear and practical introduction for RFID designers."

Prof. Rolf Jansen, Faculty of Logistics, Dortmund University:

"The book comprehensively deals with the topic in a solution-oriented way, expertly conveying...

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Mobile IPv6: Protocols and Implementation
Mobile IPv6: Protocols and Implementation

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.). 

This book covers the IPv6 host mobility protocol known as "mobile IPv6"...

Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA
Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6...

The Practical Handbook of Internet Computing
The Practical Handbook of Internet Computing
The time is absolutely ripe for this handbookThere is no single source of information that has this breadth todayFinally, there is an examination of the Internet as a holistic system. Topics of privacy, trust, policy, and law are addressed as well as the structure of the Internet and of the Web.
Stuart Feldman, Vice President, Internet
...
Pharmacoethics: A Problem-Based Approach (Plant Engineering Series)
Pharmacoethics: A Problem-Based Approach (Plant Engineering Series)
About 20 years ago, the University of New Mexico School of Medicine (SOM) established a student-centered problem-based learning (PBL) curriculum emphasizing ambulatory care practice competencies. It was designed for small groups of students working together and ran parallel with their more traditional curriculum. The SOM...
Jeff Duntemann's Drive-By Wi-Fi Guide
Jeff Duntemann's Drive-By Wi-Fi Guide
Everything you need to know to design, build, protect, and extend a Wi-Fi wireless network!

You don’t have to knock holes in your walls to network your computers and share your family’s Internet connection. Wi-Fi connects computers, printers, video cameras and game consoles into a fast Ethernet network via microwaves. In this...

First Look Microsoft Office 2003
First Look Microsoft Office 2003

What’s inside the newest Microsoft Office System? How can your business put its new capabilities to work right away? With First Look Microsoft Office 2003, you get exclusive, advance insights and straight talk from a well-known author and columnist who works closely with the Microsoft Office team. Get the edge on understanding...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy