Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Protection for Photographers: A Guide to Storing and Protecting Your Valuable Digital Assets
Data Protection for Photographers: A Guide to Storing and Protecting Your Valuable Digital Assets

All photographers, both amateur and professional, are faced with the important issues of data protection and storage. Without knowledge of the options, tools, and procedures for safe and effective image protection and storage, photographers run the serious risk of losing their image files. This book offers critical information about the best...

Variable-length Codes for Data Compression
Variable-length Codes for Data Compression
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties - such as those containing certain bit patterns, or those that are robust - and these can be useful. This book brings this large set of codes to the attention of...
Organic Synthesis: The Disconnection Approach
Organic Synthesis: The Disconnection Approach
This book will help students to design their own organic synthesis, giving a wide coverage of synthetic methods. The disconnection approach is used throughout so that starting materials are chosen after analysing the structure of the target molecule. There are forty chapters: those on the synthesis of given types of molecule alternate with strategy...
Configuring Symantec AntiVirus Corporate Edition
Configuring Symantec AntiVirus Corporate Edition
At some time in the last 15 years many of us blinked, and upon opening our eyes
we found the world on the verge of becoming one large network. Public and
private networks were interconnected both far and near, and now in your corner
of this interconnected puzzle, virus protection for the network has become
your
...
The International Handbook of Computer Security
The International Handbook of Computer Security
This book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures * data preservation and protection * hardware and software protection...
Windows Server 2008 Unleashed
Windows Server 2008 Unleashed
Windows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments. This book addresses not only what is new with Windows...
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Wireless Sensor Networks: Technology, Protocols, and Applications
Wireless Sensor Networks: Technology, Protocols, and Applications
Infrastructure for Homeland Security Environments

Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way...

Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital...
Long-term Perspective in Coastal Zone Development: Multifunctional Coastal Protection Zones
Long-term Perspective in Coastal Zone Development: Multifunctional Coastal Protection Zones

The southern coast of the North Sea is mainly protected by a single line of defence against flooding. The traditional means for heightening and strengthening the existing coastal barriers are limited due to the increased enormous resource costs, i.e. building materials, funding and space. On the other hand, further interests and needs such as...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

unlimited object storage image
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy