 |
|
 Biometric Systems: Technology, Design and Performance EvaluationThis book provides practitioners with an overview of the principles & methods needed to build reliable biometric systems. It covers 3 main topics: key biometric technologies, testing & management issues, & the legal and system considerations of biometric systems for personal verification/identification. It focuses on the 4 most widely... |  |  Data Warehouses and Olap: Concepts, Architectures and SolutionsNowadays the economy is characterized by fast and continuously changing markets and business opportunities. Therefore, in order to be successful, it is essential for an enterprise to make right business decisions and to make them fast. Business decisions are taken on the basis of analyses of the past and current condition of an enterprise as well... |  |  The Neural Simulation Language: A System for Brain ModelingThe Neural Simulation Language (NSL), developed by Alfredo Weitzenfeld, Michael Arbib, and Amanda Alexander, provides a simulation environment for modular brain modeling. NSL is an object-oriented language offering object-oriented protocols applicable to all levels of neural simulation. One of NSL's main strengths is that it allows for realistic... |
|
 |  |  Endpoint SecurityThis book makes the assumption that if we've been doing the same thing for years and we continue to fail then we must be doing something wrong. Some basic assumption about what we're doing and why we're doing it is incorrect. Yes, incorrect. But we continue to behave as if nothing is wrong. The pain is there but now the problem is that... |  |  Java Security SolutionsYour complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,... |
|
 IP LocationIn today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,... |  |  Wireless Network Security (Signals and Communication Technology)Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the... |  |  |
|
 WiMAX / MobileFi: Advanced Research and TechnologyWiMAX is bringing about a worldwide revolution in broadband wireless access, including both fixed and mobile handsets. The IEEE 802.16 working group standardized most aspects of WiMAX signaling messages. However, several algorithms were left unspecified opening the door for innovations in protocol engineering for 802.16/802.20-based broadband... |  |  java(TM).rmi: The Remote Method Invocation GuideBefore the Java language was available, distributed systems engineering was greatly concerned with the problem of heterogeneity—the differences between CPUs, OSes, languages, and data formats. The challenge was to create architectureneutral formats and protocols which could be adapted to any architecture without burdening the programmer. RPC... |  |  TCP/IP Sockets in C#: Practical Guide for Programmers"TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich carefully selected set of working examples. For the beginner of network programming, it's a good starting book; on the other hand professionals could... |
|
Result Page: 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 |