Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things and Data Analytics Handbook
Internet of Things and Data Analytics Handbook

This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.

Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Boost.Asio C++ Network Programming Cookbook
Boost.Asio C++ Network Programming Cookbook

Key Features

  • Build highly efficient distributed applications with ease
  • Enhance your cross-platform network programming skills with one of the most reputable C++ libraries
  • Find solutions to real-world problems related to network programming with ready-to-use recipes using this...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems describes and analyses the basic concepts of the combination of multi-carrier transmission with spread spectrum (MC-SS). The various architectures and the different detection strategies are examined in some depth. Techniques for capacity and flexibility enhancement of multi-carrier systems such as...
CompTIA Network+ Practice Tests: Exam N10-007
CompTIA Network+ Practice Tests: Exam N10-007

A smarter, faster review for the CompTIA Network+ exam N10-007

Expertly authored questions provide comprehensive, concise review of 100% of all CompTIA Network+ exam objectives. This certification validates skills equivalent to nine months of practical networking experience; those earning the Network+ certificate will
...

Cryptographic  Boolean  Functions and Applications
Cryptographic Boolean Functions and Applications
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).

Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean
...
Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper level under graduate and beginning graduate level that has been given at the University of Maryland since 1997. When designing the course, we decided on the fol lowing requirements.

• The course should be up-to-date and cover a broad selection of topics from a...

Symmetric Cryptographic Protocols
Symmetric Cryptographic Protocols

This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and...

Selected Readings on Telecommunication and Networking (Premier Reference Source)
Selected Readings on Telecommunication and Networking (Premier Reference Source)
Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements.

Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality chapters focused...

Cloud Computing Bible
Cloud Computing Bible

In the five months that I have been researching and writing Cloud Computing Bible, it has become clear to me that most people recognize that cloud computing is a big deal, even if they are not really clear why that is so. Every day newspaper and magazine articles and radio and TV stories report on cloud computing. The phrase “in the...

Result Page: 94 93 92 91 90 89 88 87 86 85 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy