Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MCSA Windows Server 2012 R2 Configuring Advanced Services Study Guide: Exam 70-412
MCSA Windows Server 2012 R2 Configuring Advanced Services Study Guide: Exam 70-412

The bestselling MCSA study guide, with expert instruction and hands-on practice

MCSA Windows Server 2012 R2 Configuring Advanced Services Study Guide provides focused preparation for exam 70-412 and is fully updated to align with the latest Windows Server 2012 R2 objectives. This comprehensive guide covers 100 percent...

LNA-ESD Co-Design for Fully Integrated CMOS Wireless Receivers (The Springer International Series in Engineering and Computer Science)
LNA-ESD Co-Design for Fully Integrated CMOS Wireless Receivers (The Springer International Series in Engineering and Computer Science)
LNA-ESD Co-Design for Fully Integrated CMOS Wireless Receivers fits in the quest for complete CMOS integration of wireless receiver front-ends. With a combined discussion of both RF and ESD performance, it tackles one of the final obstacles on the road to CMOS integration. The book is conceived as a design guide for those actively involved in the...
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS
"This is the right book at the right time for anyone in the telecommunications business, or anyone who is dependent on the services provided by the telecommunications business that would like to understand the new Internet that is rapidly becoming the common reality."
From the Foreword by Scott Bradner, Senior Technical Consultant
...
Strategic Patent Planning For Software Companies
Strategic Patent Planning For Software Companies
This report discusses the current status of international patent protection with regard to computer-implemented inventions, explains why relying on copyright is inadequate, and discusses how software patents promote innovation.

Strategic Patent Planning for Software Companies looks at the current patent and licensing strategies...

Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking...
Mobile Cloud Computing: Models, Implementation, and Security
Mobile Cloud Computing: Models, Implementation, and Security

Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications. The book focuses on novel and advanced algorithms, as well as mobile app development.

The book begins with an overview of mobile...

Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Topical Issues of Rational Use of Natural Resources: Proceedings of the International Forum-Contest of Young Researchers, April 18-20, 2018, St. Petersburg, Russia
Topical Issues of Rational Use of Natural Resources: Proceedings of the International Forum-Contest of Young Researchers, April 18-20, 2018, St. Petersburg, Russia

Topical Issues of Rational Use of Natural Resources contains the contributions presented at International Forum-Contest of Young Researchers 2018 (St. Petersburg Mining University, Russia, 18-20 April 2018). The Forum-Contest is an excellent opportunity for young researchers to present their work to the scientific community...

Advances in Artificial Intelligence for Privacy Protection and Security
Advances in Artificial Intelligence for Privacy Protection and Security

In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas,...

Pro Linux High Availability Clustering
Pro Linux High Availability Clustering

Pro Linux High Availability Clustering teaches you how to implement this fundamental Linux add-on into your business. Linux High Availability Clustering is needed to ensure the availability of mission critical resources. The technique is applied more and more in corporate datacenters around the world. While lots of documentation...

Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Whether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry...
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy