Home | Amazing | Today | Tags | Publishers | Years | Search 
Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Handbook of Electric Motors
Handbook of Electric Motors

Details the various types of motors and their characteristics, as well as motor selection. Discusses induction-, synchronous-, and direct-current motor analysis and design; testing for performance; and motor insulation, control, and protection.

We recognize the monumental and successful work of Professors Richard H.Englemann and William...

The ComSoc Guide to Next Generation Optical Transport: SDH/SONET/OTN
The ComSoc Guide to Next Generation Optical Transport: SDH/SONET/OTN

A comprehensive guide to SDH, SONET, and OTN

The ComSoc Guide to Next Generation Optical Transport provides a unique overview of SDH and OTN for engineers who are new to the field, as well as manufacturers, network operators, and graduate students who need a basic understanding of the topics. Fully up-to-date with the...

Are You Afraid of the Dark? : A Novel
Are You Afraid of the Dark? : A Novel

All around the globe, people are being reported dead or missing.

In Berlin, a woman vanishes from the city streets. In Paris, a man plunges from the Eiffel Tower. In Denver, a small plane crashes into the mountains. In Manhattan, a body washes ashore along the East River. At first these seem to be random incidents, but the police...

Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

Causes of War
Causes of War

Written by leading scholars in the field, Causes of War provides the first comprehensive analysis of the leading theories relating to the origins of both interstate and civil wars.

  • Utilizes historical examples to illustrate individual theories throughout
  • Includes an analysis of theories of civil wars...
Design and Analysis of Vaccine Studies (Statistics for Biology and Health)
Design and Analysis of Vaccine Studies (Statistics for Biology and Health)

Widespread immunization has many different kinds of effects in individuals and populations, including in the unvaccinated individuals. The challenge is in understanding and estimating all of these effects. This book presents a unified conceptual framework of the different effects of vaccination at the individual and at the population level....

The Executive Guide to Information Security: Threats, Challenges, and Solutions
The Executive Guide to Information Security: Threats, Challenges, and Solutions

The book provides a pragmatic approach to evaluating security at a companyand putting together an effective information security program. The bookfocuses on three key themes; People, Processes, and Technology and isorganized according to the steps executives would follow in order to developan information security program for their company....

Oracle Application Express 3.2: The Essentials and More
Oracle Application Express 3.2: The Essentials and More

Developing data-centric web applications can be a real challenge as it is a multi-disciplinary process. There are many technologies involved in the client side (HTML, CSS, JavaScript, and so on); the interaction with the database, on the server side; the typeless nature of the web environment; and above all, the need to put it all together....

The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has
The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has

Not everything that you might think is unfair in the workplace is actually illegal.

In order to fully protect your rights, you must understand them first. The Employee Answer Book, the latest addition to the Answer Book Series, answers real questions from real people. This book discusses federal employment law in detail and touches...

Optically Stimulated Luminescence Dosimetry
Optically Stimulated Luminescence Dosimetry

Optically Stimulated Luminescence (OSL) has become the technique of choice for many areas of radiation dosimetry. The technique is finding widespread application in a variety of radiation dosimetry fields, including personal monitoring, environmental monitoring, retrospective dosimetry (including geological dating and accident dosimetry),...

Metrics and Methods for Security Risk Management
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management offers powerful analytic tools that have been absent from traditional security texts. This easy-to-read text provides a handy compendium of scientific principles that affect security threats, and establishes quantitative security metrics that facilitate the development of...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy