Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Selected Readings on Telecommunication and Networking (Premier Reference Source)
Selected Readings on Telecommunication and Networking (Premier Reference Source)
Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements.

Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality chapters focused...

The Crucial Principles in Care of the Knee
The Crucial Principles in Care of the Knee
Written by internationally eminent authorities in sports medicine and knee surgery, this book thoroughly describes and illustrates the key principles in the diagnosis, surgical treatment, and rehabilitation of knee disorders. The information on surgical procedures, outcomes, and complications is evidence-based and documented from a database of over...
Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Immunochemical Protocols (Methods in Molecular Biology)
Immunochemical Protocols (Methods in Molecular Biology)

Immunochemical techniques have been in use for many years with early examples of bacterial strain typing dating back to the 1940s. The basis for the science is the exquisite elegance of the mammalian immune system with its ability to recognize foreign proteins and to manufacture antibody m- ecules that strongly bind to the substances that...

The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
The only Cisco-endorsed study guide for the new CCNA #640-507 examCoverage of all CCNA exam topics enables you to discover and fill your knowledge gaps before sitting the exam. You will learn about:Internetworking functions of each layer of the OSI reference model and how they are performed in network devicesDesign, implementation, configuration,...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Cloud Computing Bible
Cloud Computing Bible

In the five months that I have been researching and writing Cloud Computing Bible, it has become clear to me that most people recognize that cloud computing is a big deal, even if they are not really clear why that is so. Every day newspaper and magazine articles and radio and TV stories report on cloud computing. The phrase “in the...

Building a VoIP Network with Nortel's Multimedia Communication Server 5100
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
This is the only book you need if you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products. With this book, you'll be able to design, build, secure, and maintaining a cutting-edge converged network...
Windows Server 2008 All-In-One Desk Reference For Dummies (Computer/Tech)
Windows Server 2008 All-In-One Desk Reference For Dummies (Computer/Tech)

Covers the all-new Windows Server 2008!

Your one-stop guide to setting up, using, and maintaining Windows Server 2008

If, like many system administrators, you've been waiting impatiently for the arrival of Windows Server 2008, wait no more! It's here, and so is this book to help...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy