Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web

Privacy is a basic human need, and losing privacy is perceived as an extremely threatening experience. Privacy embraces solitude, personal space, or intimacy with family and friends and as such, it is a ubiquitous and trans-cultural phenomenon. Privacy leverages well-being; without privacy we are at risk of becoming physically or...

Outlook 2013 For Dummies
Outlook 2013 For Dummies

The fun and friendly way to manage your busy life with the new Outlook 2013

As the number one e-mail client and personal information manager, Microsoft Outlook offers a set of uncomplicated features that maximize the management of your e-mail, schedule, and general daily activities, with the least amount of hassle possible....

Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
Your step-by-step guide to creating authentication processes that assure compliance

To comply with Sarbanes-Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that,...

The XP Files:  Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration
The XP Files: Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration

XP's Best-Kept Secrets--Revealed!

During the past decade, Microsoft has created the some of the best Internet communication programs in the world and has installed them on every Windows computer--free, but mostly hidden. Until now, only a few knowledgeable computer users knew how to exploit the potential of these programs--and understood...

Information Security Management Handbook, Sixth Edition (Isc2 Press)
Information Security Management Handbook, Sixth Edition (Isc2 Press)
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion...
SemProM: Foundations of Semantic Product Memories for the Internet of Things (Cognitive Technologies)
SemProM: Foundations of Semantic Product Memories for the Internet of Things (Cognitive Technologies)

The development of low-cost, compact digital storage, sensors and radio modules allows us to embed digital memories into products to record key events. Such computationally enhanced products can perceive and control their environment, analyze their observations, and communicate with other smart objects and human users. Digital product...

Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes of mobility data. This is a scenario of great opportunities and risks: on one side, mining this data can produce useful knowledge, supporting sustainable mobility and...
Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

Learn iOS 11 Programming with Swift 4 - Second Edition: Learn the fundamentals of iOS app development with Swift 4 and Xcode 9
Learn iOS 11 Programming with Swift 4 - Second Edition: Learn the fundamentals of iOS app development with Swift 4 and Xcode 9

Begin your iOS development journey using Swift 4 and XCode 9 with this easy to learn, practical guide.

Key Features

  • Explore the latest features of iOS 11 and Swift 4 to build robust applications
  • Kickstart your iOS development career by building your first application from...
Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Covers Release Candidate of Windows 7. 

With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.

 

Microsoft® Windows 7 Unleashed...

Facebook For Dummies
Facebook For Dummies

The eagerly anticipated update to the bestselling first edition is here!

Facebook's popularity is seemingly unstoppable. The site experienced a huge boom in registered users in the latter half of 2008. It was at that time that Facebook also underwent a radical facelift and introduced numerous changes. Packed with hundreds of screen...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy