|
|
|
|
Embedded Security in Cars: Securing Current and Future Automotive IT ApplicationsMost innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive... | | Application Acceleration and WAN Optimization FundamentalsIT organizations face a number of increasing pressures to increase productivity, improve application performance, provide infrastructure conducive to global collaboration, improve posture toward data protection and compliance, and minimize costs across the board. These pressures come largely as a result of initiatives to increase availability and... | | Atoms, Radiation, and Radiation Protection (Physics Textbook)Since the preparation of the second edition (1995) of Atoms, Radiation, and Radiation Protection, many important developments have taken place that affect the profession of radiological health protection. The International Commission on Radiological Protection (ICRP) has issued new documents in a number of areas that are addressed in this third... |
|
|
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems
This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overview of the fundamental principles and... | | Geeks On Call Security and Privacy: 5-Minute FixesBringing order to the lawless frontier
Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To this lawless high-tech frontier comes the cavalry, mounted on (or in) blue PT Cruisers—Geeks On Call. Now they're... | | Data Protection
This is the fundamental truth about data protection: backup is dead.
Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.
So what is data... |
|
Process Engineering and Design Using Visual BasicSoftware tools are a great aid to process engineers, but too much dependence on such tools can often lead to inappropriate and suboptimal designs. Reliance on software is also a hindrance without a firm understanding of the principles underlying its operation, since users are still responsible for devising the design. In Process Engineering and... | | Basics of Contemporary Cryptography for IT PractitionersThe aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques... | | |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |