Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Communications Design Handbook, Vol. 2: Terrestrial and Mobile Interference
Wireless Communications Design Handbook, Vol. 2: Terrestrial and Mobile Interference
Most books in wireless communications address technical subjects which are relevant to ground mobile systems. Volume 2: Terrestrial and Mobile Interference of the Wireless Communications Design Handbook addresses a topic frequently overlooked in ground mobile wireless system design: interference problems at the...
Mac OS X Security
Mac OS X Security
Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of...
Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
CCNP Security Secure 642-637 Official Cert Guide
CCNP Security Secure 642-637 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

 

...
Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

Advanced Oxidation Technologies: Sustainable Solutions for Environmental Treatments (Sustainable Energy Developments)
Advanced Oxidation Technologies: Sustainable Solutions for Environmental Treatments (Sustainable Energy Developments)

Advanced Oxidation Technologies (AOTs) or Processes (AOPs) are relatively new and innovative technologies to remove harmful and toxic pollutants. The most important processes among them are those using light, such as UVC/H2O2, photo-Fenton and heterogeneous photocatalysis with TiO2. These technologies are also relatively low-cost and...

The Definitive Guide to ARM® Cortex®-M3 and Cortex®-M4 Processors, Third Edition
The Definitive Guide to ARM® Cortex®-M3 and Cortex®-M4 Processors, Third Edition

This new edition has been fully revised and updated to include extensive information on the ARM Cortex-M4 processor, providing a complete up-to-date guide to both Cortex-M3 and Cortex-M4 processors, and which enables migration from various processor architectures to the exciting world of the Cortex-M3 and M4.

This book presents the...

Windows 8 For Dummies
Windows 8 For Dummies

The bestselling tech book of all time, now updated for Windows 8

Microsoft Windows is the operating system that runs nearly 90 percent of the world's computers. Windows 8 will offer new interface updates, cloud-based services, and much more. This update of Andy Rathbone's bestselling Windows guide covers all the...

Hydraulic Fracturing Chemicals and Fluids Technology
Hydraulic Fracturing Chemicals and Fluids Technology

When classifying fracturing fluids and their additives, it is important that production, operation, and completion engineers understand which chemical should be utilized in different well environments. A user's guide to the many chemicals and chemical additives used in hydraulic fracturing operations, Hydraulic Fracturing Chemicals and...

unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy