Home | Amazing | Today | Tags | Publishers | Years | Search 
Net Locality: Why Location Matters in a Networked World
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk with crowds of anonymous people. He sees skyscrapers and signage extending to the horizon. There is a lot going on – people talking, walking, playing, fighting, screaming, driving, and smiling. He sees a coffee shop that excites his interest. He pulls...
Beginning Facebook Game Apps Development (Beginning Apress)
Beginning Facebook Game Apps Development (Beginning Apress)
Facebook has emerged over the last several years as the dominant social space. Their astronomical growth has made it the platform for social interaction on the web. Although there have been some hiccups along the way with privacy concerns, Facebook continues to grow and provide a space for users worldwide to interact with one...
Sams Teach Yourself Google+ in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself Google+ in 10 Minutes (Sams Teach Yourself -- Minutes)

Sams Teach Yourself Google™+ in 10 Minutes gives you straightforward, practical answers when you need fast results. Work through its 10-minute lessons to jumpstart your Google+ experience...and then use today’s hottest social network to connect with everyone and everything you care about!  

...
Quantum Cryptography and Secret-Key Distillation
Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques of quantum cryptography, including secret-key distillation, as well as some more advanced topics. As quantum cryptography is now becoming a practical reality with products available commercially, it is important to focus not only on the theory of quantum...
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
Pharmacoethics: A Problem-Based Approach (Plant Engineering Series)
Pharmacoethics: A Problem-Based Approach (Plant Engineering Series)
About 20 years ago, the University of New Mexico School of Medicine (SOM) established a student-centered problem-based learning (PBL) curriculum emphasizing ambulatory care practice competencies. It was designed for small groups of students working together and ran parallel with their more traditional curriculum. The SOM...
The Essential Guide to Telecommunications (5th Edition) (Essential Guides (Prentice Hall))
The Essential Guide to Telecommunications (5th Edition) (Essential Guides (Prentice Hall))

A Completely Revised Bestseller with an Updated Industry Overview and New Coverage of Mobile Networks, LTE, Spectrum, Cloud Computing, and More!

 

The #1 Telecom Guide for Businesspeople and Nontechnical Professionals, Fully Updated for Cloud...

The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

My New iPad: A User's Guide (3rd Edition) (My New... (No Starch Press))
My New iPad: A User's Guide (3rd Edition) (My New... (No Starch Press))
There’s an old story about blind men examining an elephant. Based on what they feel, each man concludes that the elephant is something completely different—one man believes the elephant is a tree, another man a snake, the third a wall. When you first share your iPad with your family and...
HBase in Action
HBase in Action

I got my start with HBase in the fall of 2008. It was a young project then, released only in the preceding year. As early releases go, it was quite capable, although not without its fair share of embarrassing warts. Not bad for an Apache subproject with fewer than 10 active committers to its name! That was the height of the NoSQL...

Information Security For The Little Guy
Information Security For The Little Guy
Being secure in an insecure world is a tough nut to crack. There are so many ways that our personal information can be stolen and duplicated today it is a very serious situation and should be taken very seriously.

From our surfing the Internet to just the simplicity of speaking on a cell phone to our friends can
...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy