Home | Amazing | Today | Tags | Publishers | Years | Search 
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the...

Development and Performance Evaluation of an Adaptive MAC Protocol for MC-CDMA Wireless LANs with QoS Support
Development and Performance Evaluation of an Adaptive MAC Protocol for MC-CDMA Wireless LANs with QoS Support
Amobile adhoc network, is a system of autonomous mobile terminals connected by wireless links. Being independent of any infrastructure, these networks have the ability to be deployed easily, fast and cost efficient. The objective of this thesis is to exploit the advantages of the application of Code Division Multiple Access (CDMA) in the lower...
Network+ Study Guide (2nd Edition)
Network+ Study Guide (2nd Edition)
Here's the book you need to prepare for CompTIA's updated Network+ exam, N10-003.

This revised edition of the best-selling Network+ Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the focused and accessible instructional approach that has...

Multicast Sockets: Practical Guide for Programmers (The Practical Guides)
Multicast Sockets: Practical Guide for Programmers (The Practical Guides)

Multicast Sockets: Practical Guide for Programmers is a hands-on, application-centric approach to multicasting (as opposed to a network-centric one) that is filled with examples, ideas, and experimentation. Each example builds on the last to introduce multicast concepts, frameworks, and APIs in an engaging manner that does not burden...

Ruby on Rails Web Mashup Projects
Ruby on Rails Web Mashup Projects
A web mashup is a new type of web application that uses data and services from one or more external sources to build entirely new and different web applications. Web mashups usually mash up data and services that are available on the Internet—freely, commercially, or through other partnership agreements. The external sources that a mashup...
Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
CISCO TCP/IP Routing Professional Reference, Revised and Expanded
CISCO TCP/IP Routing Professional Reference, Revised and Expanded
An absolute gem of a reference guide, Cisco TCP/IP Routing Professional Reference brings the empyreal realm of routers and protocols solidly to earth. The author provides excellent analogies coupled with practical tips, making this book suitable for those new to the strange terrain of Cisco routers and TCP/IP networking as well as for the...
Cisco CCIE Fundamentals: Network Design & Case Studies
Cisco CCIE Fundamentals: Network Design & Case Studies
For a sophisticated view of networking design concepts that goes from lofty to granular in the blink of an eye, Network Design and Case Studies is a sure winner. This mammoth entry in Cisco's growing collection of reference books provides equal parts academic theory and practical application.

The first half of the book deals...

Building Internet Firewalls (2nd Edition)
Building Internet Firewalls (2nd Edition)
In the vast and varied universe of computer books, only a few stand out as the best in their subject areas. Building Internet Firewalls is one of those. It's deep, yet carefully focused, so that almost anything you might want to know about firewall strategies for protecting networks is here. In addition, there's lots of information on...
Handbook of Algorithms for Wireless Networking and Mobile Computing
Handbook of Algorithms for Wireless Networking and Mobile Computing

Handbook of Algorithms for Wireless Networking and Mobile Computing focuses on several aspects of mobile computing, particularly algorithmic methods and distributed computing with mobile communications capability. This volume provides the topics that are crucial for building the foundation for the design and construction of future generations of...

Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy