Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networks and Services: Carrier Ethernet, PBT, MPLS-TP, and VPLS (Information and Communication Technology Series,)
Networks and Services: Carrier Ethernet, PBT, MPLS-TP, and VPLS (Information and Communication Technology Series,)

This book provides a comprehensive understanding of current and debated future networking technologies. It gives insight into building end-to-end networks and services with Carrier Ethernet, PBT, MPLS-TP, and VPLS while also shedding light on the pros and cons of these technologies for service providers and enterprise network owners.

...

Digital Imaging for Cultural Heritage Preservation: Analysis, Restoration, and Reconstruction of Ancient Artworks
Digital Imaging for Cultural Heritage Preservation: Analysis, Restoration, and Reconstruction of Ancient Artworks
Paintings, frescoes, antique photographic prints, incunabula, old books, handwritten documents, sculptures, ceramic fragments, and other ancient manufacts constitute the elements of an extremely valuable and immense historical patrimony. The digitalization of these treasures opens up the possibility of using image processing and...
Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Digital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos
Digital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos

Digital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos is for those who are planning a digital asset management system or interested in becoming digital asset managers. This book explains both the purpose of digital asset management systems and why an organization...

Surveillance and Threat Detection: Prevention versus Mitigation
Surveillance and Threat Detection: Prevention versus Mitigation

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years....

Plant and Human Health, Volume 3: Pharmacology and Therapeutic Uses
Plant and Human Health, Volume 3: Pharmacology and Therapeutic Uses

Early anthropological evidence for plant use as medicine is 60,000 years old as reported from the Neanderthal grave in Iraq. The importance of plants as medicine is further supported by archeological evidence from Asia and the Middle East. Today, around 1.4 billion people in South Asia alone have no access to modern health care, and...

Information Security Management Handbook, Fifth Edition
Information Security Management Handbook, Fifth Edition

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...

Handbook of Electric Motors
Handbook of Electric Motors

Details the various types of motors and their characteristics, as well as motor selection. Discusses induction-, synchronous-, and direct-current motor analysis and design; testing for performance; and motor insulation, control, and protection.

We recognize the monumental and successful work of Professors Richard H.Englemann and William...

Windows 2000 Server System Administration Handbook
Windows 2000 Server System Administration Handbook
In large, readable type, this book describes the most basic network administration tasks as well as new features of Windows 2000 Server and improvements over its predecessor, NT 4.0. Topics include setting up and organizing user accounts; administering file resources, accounts, and printer resources; managing storage data; monitoring event logs;...
GFI Network Security and PCI Compliance Power Tools
GFI Network Security and PCI Compliance Power Tools
Use GFI's Tools to Search for Vulnerabilities in Your Network!

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.
...
Landscapes of Mars: A Visual Tour
Landscapes of Mars: A Visual Tour

Practically next door to us in our Solar System, Mars is the most Earth-like of all the worlds held in perpetual motion by the Sun’s gravity. It is a planet that has fascinated and intrigued humans since prehistoric times. The Greeks named it Ares, after their god of war. The connection was easy to make because of the planet’s...

Medical Data Sharing, Harmonization and Analytics
Medical Data Sharing, Harmonization and Analytics

Medical Data Sharing, Harmonization and Analytics serves as the basis for understanding the rapidly evolving field of medical data harmonization combined with the latest cloud infrastructures for storing the harmonized (shared) data. Chapters cover the latest research and applications on data sharing and protection in the...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy