Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Digital Homecare (Series in Biomedical Engineering)
Handbook of Digital Homecare (Series in Biomedical Engineering)

Digital Homecare is a collection of services to deliver, maintain and improve care in the home environment using the latest ICT technology and devices.

It is important to recognize the wide range of issues that are covered by digital homecare. This book shows a good selection of related issues, be it experience, technologies, managerial...

Linux Administration: A Beginner's Guide, Fifth Edition
Linux Administration: A Beginner's Guide, Fifth Edition
Administering a Linux system isn't much like administering a Windows machine. Though the goals are similar and comparable problems arise under both environments, they each require administrators to adopt a certain way of thinking about processes and data. Linux Administration: A Beginner's Guide helps readers adapt their Windows experience...
Advances in Information Processing and Protection
Advances in Information Processing and Protection
This book contains a selection of the best papers given at the Advanced Computer Systems Conference in October 2006 in Poland. The book is partitioned into four topical areas:

The Artificial Intelligence section includes papers on Humatronics, Fuzzy Logic, Robotics, Cell, Genetic and Probabilistic Algorithms, Incomplete Data and Similarity...

Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Every company needs to protect its people and other assets by managing risk in the hiring process!

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be
...
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
This volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information...
Marine Acoustics: Direct and Inverse Problems
Marine Acoustics: Direct and Inverse Problems
‘This book is a very thorough mathematical treatise on direct and inverse problems in marine acoustics. Waveguide inversion problems have not received the attention they deserve in the literature and this book may correct some of this inattention.’ John A. DeSanto, Mathematical Reviews

This book presents current
...
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Voice and Audio Compression for Wireless Communications
Voice and Audio Compression for Wireless Communications
"I recommend this book as a useful reference on voice and audio compression for wireless communication." (Computing Reviews, June 10, 2008)

Voice communications remains the most important facet of mobile radio services, which may be delivered over conventional fixed links, the Internet or wireless channels. This
...
Guide to the Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)
Guide to the Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)

Guide to the Wiring Regulations

17th Edition IEE Wiring Regulations (BS 7671: 2008)

Darrell Locke IEng MIEE ACIBSE, Electrical Contractors' Association, UK

Essential for electrical installers and installation...

LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy