 |
|
 Business Strategies for the Next-Generation Network (Informa Telecoms & Media)Carriers and service providers have united around the concept of the Next-Generation Network (NGN). Although leveraging a broad basket of Internet technologies, the NGN is not being planned as the next-generation Internet. In its intention and architecture, it is more accurately described as Broadband-ISDN release 2.0. The NGN is hard to... |  |  IP LocationIn today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,... |  |  Java Security SolutionsYour complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,... |
|
 Endpoint SecurityThis book makes the assumption that if we've been doing the same thing for years and we continue to fail then we must be doing something wrong. Some basic assumption about what we're doing and why we're doing it is incorrect. Yes, incorrect. But we continue to behave as if nothing is wrong. The pain is there but now the problem is that... |  |  |  |  The Neural Simulation Language: A System for Brain ModelingThe Neural Simulation Language (NSL), developed by Alfredo Weitzenfeld, Michael Arbib, and Amanda Alexander, provides a simulation environment for modular brain modeling. NSL is an object-oriented language offering object-oriented protocols applicable to all levels of neural simulation. One of NSL's main strengths is that it allows for realistic... |
|
 Data Warehouses and Olap: Concepts, Architectures and SolutionsNowadays the economy is characterized by fast and continuously changing markets and business opportunities. Therefore, in order to be successful, it is essential for an enterprise to make right business decisions and to make them fast. Business decisions are taken on the basis of analyses of the past and current condition of an enterprise as well... |  |  Biometric Systems: Technology, Design and Performance EvaluationThis book provides practitioners with an overview of the principles & methods needed to build reliable biometric systems. It covers 3 main topics: key biometric technologies, testing & management issues, & the legal and system considerations of biometric systems for personal verification/identification. It focuses on the 4 most widely... |  |  Cisco Network Security Little Black BookWith this concise, problem-solving guide, networking professionals will learn how to identify network security threat implement uniform security throughout their networks, secure remote dial-in access with CiscoSecure ACS and Cisco IOS AAA features, protect Internet access on their perimeter routers with the CiscoSecure IOS firewall software, and... |
|
|
| Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 |