Home | Amazing | Today | Tags | Publishers | Years | Search 
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems

This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overview of the fundamental principles and...

Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Introduction to Cryptography
Introduction to Cryptography

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

CCNP Security Secure 642-637 Official Cert Guide
CCNP Security Secure 642-637 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

 

...
Professional Issues in Software Engineering
Professional Issues in Software Engineering

It is widely recognized that a professional engineer needs to be aware of a range of issues much wider than the mere technical knowledge necessary to practice the chosen engineering discipline. The Engineering Council, for example, requires that the formation of a professional engineer should include, amongst other things,

...

Guide to Networking Essentials, Fourth Edition
Guide to Networking Essentials, Fourth Edition

This book is intended to serve the needs of individuals and information systems pro- fessionals who are interested in learning more about networking technologies, but who may have little or no background in this subject matter. In the first edition of this book, the materials were originally designed to help individuals prepare for Microsoft...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Oracle Performance Troubleshooting: With Dictionary Internals SQL & Tuning Scripts (Oracle In-Focus series)
Oracle Performance Troubleshooting: With Dictionary Internals SQL & Tuning Scripts (Oracle In-Focus series)

More than ever before, today's Oracle DBA faces a database farm that is growing both in physical size and actual numbers. To keep these databases up and performing at exceptional levels, the database administrator needs more than a cobbled together set of scripts that they use to (hopefully) verify that everything is in order.

...

Mastering Autodesk Revit MEP 2011 (Autodesk Official Training Guides)
Mastering Autodesk Revit MEP 2011 (Autodesk Official Training Guides)

Master all the core concepts and functionality of Revit MEP

Revit MEP has finally come into its own, and this perfectly paced reference covers all the core concepts and functionality of this fast-growing mechanical, electrical, and plumbing software. The authors collate all their years of experience to develop this...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

The Definitive Guide to the ARM Cortex-M3, Second Edition
The Definitive Guide to the ARM Cortex-M3, Second Edition

This user's guide does far more than simply outline the ARM Cortex-M3 CPU features; it explains step-by-step how to program and implement the processor in real-world designs. It teaches readers how to utilize the complete and thumb instruction sets in order to obtain the best functionality, efficiency, and reuseability. The author, an ARM...

Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy