Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...

Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

Rethinking Enterprise Storage: A Hybrid Cloud Model
Rethinking Enterprise Storage: A Hybrid Cloud Model
Just as the Internet has fundamentally changed many industries, cloud computing is fundamentally changing the information technology industry, including infrastructures such as enterprise data storage. This book is about one of the new infrastructure game changers—a storage architecture called hybrid cloud storage that was...
Smart Card Handbook
Smart Card Handbook

The most comprehensive book on state-of-the-art smart card technology available

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...

x86 Instruction Set Architecture
x86 Instruction Set Architecture

The Instruction Set Architecture, or ISA, is defined as that part of the processor architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO. With the exception of some small deviations and differences in...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Above the Clouds: Managing Risk in the World of Cloud Computing
Above the Clouds: Managing Risk in the World of Cloud Computing

Interested in ways to make your business more efficient? Then Cloud Computing may be just what you have been looking for. Cloud Computing can enable you to drive down the costs of your IT function and gives you the ability to focus on your core business, whilst saving energy. The concept of shifting computing to a shared service provider is...

Advances in Audio and Speech Signal Processing: Technologies and Applications
Advances in Audio and Speech Signal Processing: Technologies and Applications

Audio and speech processing have achieved important status in development in the last three decades, improving the standard of living of many people. Regarding these applications, several signal processing algorithms have been developed to assist the speech impaired and improve the learning ability of children. Advances in Audio and Speech...

Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results

Harness the Power of Your Most Valuable Resource—Your Workforce!

Process improvement approaches like Six Sigma and Lean Enterprise have worked wonders for countless organizations, but in the drive for true excellence, these approaches are only one important part of the formula.

Building Engaged...

Networks and Services: Carrier Ethernet, PBT, MPLS-TP, and VPLS (Information and Communication Technology Series,)
Networks and Services: Carrier Ethernet, PBT, MPLS-TP, and VPLS (Information and Communication Technology Series,)

This book provides a comprehensive understanding of current and debated future networking technologies. It gives insight into building end-to-end networks and services with Carrier Ethernet, PBT, MPLS-TP, and VPLS while also shedding light on the pros and cons of these technologies for service providers and enterprise network owners.

...

Linear and Non-Linear Video and TV Applications: Using IPv6 and IPv6 Multicast
Linear and Non-Linear Video and TV Applications: Using IPv6 and IPv6 Multicast

Provides options for implementing IPv6 and IPv6 multicast in service provider networks

New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging...

Hydraulic Fracturing Chemicals and Fluids Technology
Hydraulic Fracturing Chemicals and Fluids Technology

When classifying fracturing fluids and their additives, it is important that production, operation, and completion engineers understand which chemical should be utilized in different well environments. A user's guide to the many chemicals and chemical additives used in hydraulic fracturing operations, Hydraulic Fracturing Chemicals and...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy