Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
6LoWPAN: The Wireless Embedded Internet
6LoWPAN: The Wireless Embedded Internet

"It is stunningly thorough and takes readers meticulously through the design, con?guration and operation of IPv6-based, low-power, potentially mobile radio-based networking." Vint Cerf, Vice President and Chief Internet Evangelist, Google

This book provides a complete overview of IPv6 over Low Power Wireless...

Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices
Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices

Break through the hype and learn how to extract actionable intelligence from the flood of IoT data

Key Features

  • Make better business decisions and acquire greater control of your IoT infrastructure
  • Learn techniques to solve unique problems associated with IoT and examine and analyze data...
Parallel Imaging in Clinical MR Applications (Medical Radiology)
Parallel Imaging in Clinical MR Applications (Medical Radiology)

This book presents the first in-depth introduction to parallel imaging techniques and, in particular, to the application of parallel imaging in clinical MRI. It will provide readers with a broader understanding of the fundamental principles of parallel imaging and of the advantages and disadvantages of specific MR protocols in clinical...

Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Wireless Security: Models, Threats, and Solutions
Wireless Security: Models, Threats, and Solutions
REAL-WORLD WIRELESS SECURITY

This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to...

Aspect-Oriented Programming with the e  Verification Language: A Pragmatic Guide for Testbench Developers (Systems on Silicon)
Aspect-Oriented Programming with the e Verification Language: A Pragmatic Guide for Testbench Developers (Systems on Silicon)
Whats this AOP thing anyway, reallywhen you get right down to itand can someone please explain what an aspect actually is?

Aspect-Oriented Programming with the e Verification Language takes a pragmatic, example based, and fun approach to unraveling the mysteries of AOP. In this book, youll learn how to:

Use
...
TCP/IP Sockets in Java, Second Edition: Practical Guide for Programmers (The Practical Guides)
TCP/IP Sockets in Java, Second Edition: Practical Guide for Programmers (The Practical Guides)
Most Internet applications use sockets to implement network communication protocols. TCP/IP Sockets in Java: Practical Guide for Programmers, with its focused, tutorial-based coverage, helps you master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Later chapters teach you to implement...
Macrophages: A Practical Approach
Macrophages: A Practical Approach

Macrophages are an important part of the immune response and are characterized by their ability to phagocytose foreign matter. However the difficulties involved in macrophage isolation mean they are some of the body's least explored cells. Macrophage Methodology describes how to isolate moderate to high yields of viable cells...

Mastering Wireshark
Mastering Wireshark

Key Features

  • Master Wireshark and train it as your network sniffer
  • Impress your peers and get yourself pronounced as a network doctor
  • Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network...
Junos Cookbook
Junos Cookbook

The Juniper Networks routing platforms are becoming the go-to solution for core, edge, metro and remote office networks, and JUNOS software is behind it all. The operating system is so full of industrial-strength routing protocols and IP innovations that those treading into the world of JUNOS will need clarification,...

Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
unlimited object storage image
Result Page: 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy