Home | Amazing | Today | Tags | Publishers | Years | Search 
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
This volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information...
Marine Acoustics: Direct and Inverse Problems
Marine Acoustics: Direct and Inverse Problems
‘This book is a very thorough mathematical treatise on direct and inverse problems in marine acoustics. Waveguide inversion problems have not received the attention they deserve in the literature and this book may correct some of this inattention.’ John A. DeSanto, Mathematical Reviews

This book presents current
...
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Voice and Audio Compression for Wireless Communications
Voice and Audio Compression for Wireless Communications
"I recommend this book as a useful reference on voice and audio compression for wireless communication." (Computing Reviews, June 10, 2008)

Voice communications remains the most important facet of mobile radio services, which may be delivered over conventional fixed links, the Internet or wireless channels. This
...
Guide to the Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)
Guide to the Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)

Guide to the Wiring Regulations

17th Edition IEE Wiring Regulations (BS 7671: 2008)

Darrell Locke IEng MIEE ACIBSE, Electrical Contractors' Association, UK

Essential for electrical installers and installation...

Linux Administration: A Beginner's Guide, Fifth Edition
Linux Administration: A Beginner's Guide, Fifth Edition
Administering a Linux system isn't much like administering a Windows machine. Though the goals are similar and comparable problems arise under both environments, they each require administrators to adopt a certain way of thinking about processes and data. Linux Administration: A Beginner's Guide helps readers adapt their Windows experience...
Molecular Catalysts for Energy Conversion (Springer Series in Materials Science)
Molecular Catalysts for Energy Conversion (Springer Series in Materials Science)
The role of molecular catalysts for energy conversion grows more and more important since these have wide applications in fuel cells, electrochemical solar cells, artificial photo-syntheses, and so on. A firm strategy for their design and application is awaited to cope with the expeditious solution of the latest energy and environment issues. This...
Math You Can't Use: Patents, Copyright, and Software
Math You Can't Use: Patents, Copyright, and Software
The field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Electric Power Substations Engineering, Second Edition (The Electric Power Engineering)
Electric Power Substations Engineering, Second Edition (The Electric Power Engineering)
…this book provides a good overview of the many areas that need to be planned for in the construction of a new substation. … [The] chapters give a good description, along with many photographs and schematics … This would be an excellent book for substation engineers, substation project planners and as a supplemental book for...
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy