Home | Amazing | Today | Tags | Publishers | Years | Search 
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Arduino Internals
Arduino Internals

Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Model Checking Software: 17th International SPIN Workshop, Enschede, The Netherlands
Model Checking Software: 17th International SPIN Workshop, Enschede, The Netherlands

This volume contains the proceedings of the 17th International SPIN Workshop on Model Checking Software (SPIN 2010). The workshop was organized by and held at the University of Twente, The Netherlands, on 27–29 September 2010. The workshop was co-located with the 5th International Conference on Graph Transformation (ICGT 2010)...

Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011

The 13th IMA Conference on Cryptography and Coding was held at the Lady Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This event was a 25th anniversary celebration of the very successful biennial IMA conference series. Traditionally, the conference has taken place at the Royal Agricultural College,...

Network Warrior
Network Warrior

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

...
Networking Fundamentals: Wide, Local and Personal Area Communications
Networking Fundamentals: Wide, Local and Personal Area Communications

Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyle. At the time of writing, over 3 billion...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

CCDA 640-864 Official Cert Guide (4th Edition)
CCDA 640-864 Official Cert Guide (4th Edition)

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

 

...
Tools and Algorithms for the Construction and Analysis of Systems: 17th International Conference
Tools and Algorithms for the Construction and Analysis of Systems: 17th International Conference

This volume contains the proceedings of the 17th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2011). TACAS 2011 took place in Saarbr¨ucken, Germany, March 28–31, 2011, as part of the 14th European Joint Conferences on Theory and Practice of Software (ETAPS 2011), whose...

Mobile and Wireless Network Security and Privacy
Mobile and Wireless Network Security and Privacy

Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. Major security and privacy issues for standard wireless networks include the authentication of wireless clients and...

UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained
UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained

UMTS is real. In a continuously growing number of countries we can walk in the stores of mobile network operators or resellers and take UMTS PC cards or even third-generation (3G) phones home and use them instantly. Every day the number of equipments and their feature sets gets broader. The “dream” of multimedia on mobile...

Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy