Home | Amazing | Today | Tags | Publishers | Years | Search 
Oracle Application Express 3.2: The Essentials and More
Oracle Application Express 3.2: The Essentials and More

Developing data-centric web applications can be a real challenge as it is a multi-disciplinary process. There are many technologies involved in the client side (HTML, CSS, JavaScript, and so on); the interaction with the database, on the server side; the typeless nature of the web environment; and above all, the need to put it all together....

Biodiversity: Conserving Endangered Species (Green Technology)
Biodiversity: Conserving Endangered Species (Green Technology)

Students with a basic understanding of the environment and concern for its future know the importance of preserving biological diversity. Biodiversity is the variety of living things on Earth or in a specific area. This definition seems simple enough to understand, yet the concept of biodiversity has deeper meanings that challenge even trained...

Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Handbook of Electric Motors
Handbook of Electric Motors

Details the various types of motors and their characteristics, as well as motor selection. Discusses induction-, synchronous-, and direct-current motor analysis and design; testing for performance; and motor insulation, control, and protection.

We recognize the monumental and successful work of Professors Richard H.Englemann and William...

The ComSoc Guide to Next Generation Optical Transport: SDH/SONET/OTN
The ComSoc Guide to Next Generation Optical Transport: SDH/SONET/OTN

A comprehensive guide to SDH, SONET, and OTN

The ComSoc Guide to Next Generation Optical Transport provides a unique overview of SDH and OTN for engineers who are new to the field, as well as manufacturers, network operators, and graduate students who need a basic understanding of the topics. Fully up-to-date with the...

Are You Afraid of the Dark? : A Novel
Are You Afraid of the Dark? : A Novel

All around the globe, people are being reported dead or missing.

In Berlin, a woman vanishes from the city streets. In Paris, a man plunges from the Eiffel Tower. In Denver, a small plane crashes into the mountains. In Manhattan, a body washes ashore along the East River. At first these seem to be random incidents, but the police...

Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

Causes of War
Causes of War

Written by leading scholars in the field, Causes of War provides the first comprehensive analysis of the leading theories relating to the origins of both interstate and civil wars.

  • Utilizes historical examples to illustrate individual theories throughout
  • Includes an analysis of theories of civil wars...
Design and Analysis of Vaccine Studies (Statistics for Biology and Health)
Design and Analysis of Vaccine Studies (Statistics for Biology and Health)

Widespread immunization has many different kinds of effects in individuals and populations, including in the unvaccinated individuals. The challenge is in understanding and estimating all of these effects. This book presents a unified conceptual framework of the different effects of vaccination at the individual and at the population level....

The Executive Guide to Information Security: Threats, Challenges, and Solutions
The Executive Guide to Information Security: Threats, Challenges, and Solutions

The book provides a pragmatic approach to evaluating security at a companyand putting together an effective information security program. The bookfocuses on three key themes; People, Processes, and Technology and isorganized according to the steps executives would follow in order to developan information security program for their company....

IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...

Fundamentals of Wireless Sensor Networks: Theory and Practice
Fundamentals of Wireless Sensor Networks: Theory and Practice

In this book, the authors describe the fundamental concepts and practical aspects of wireless sensor networks. The book provides a comprehensive view to this rapidly evolving field, including its many novel applications, ranging from protecting civil infrastructure to pervasive health monitoring. Using detailed examples and illustrations,...

Result Page: 49 48 47 46 45 44 43 42 41 40 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy