 |
|
|
 Identity Management: Concepts, Technologies, and Systems
Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and... |  |  Sound Systems: Explicit, Systematic Phonics in Early Literacy Contexts
How to teach phonics to young children is one of the most vexing and complex issues for early childhood educators today. Teachers know lockstep commercial phonics programs do not meet the needs of all children. At the same time, teachers who avoid explicit instruction in phonics because they lack linguistic and assessment know-how... |  |  Discrete Mathematics (Jones and Bartlett Books in Computer Science)
This book is designed for an introductory course in discrete mathematics that serves a variety of majors, including mathematics, computer science, and engineering. The book is the outgrowth of a course at Portland State University that has evolved over 15 years from a course for upper-division students into a course for sophomores. The book... |
|
 A Laboratory Course in C++ Data Structures, Second Edition
With a dynamic learn-by-doing focus, this laboratory manual encourages students to explore data structures by implementing them, a process through which students discover how data structures work and how they can be applied.
We have used James Robergé’s laboratory manual for three years at Taylor University. The... |  |  An Engineer's Guide to Automated Testing of High-Speed Interfaces
Providing a complete introduction to the state-of-the-art in high-speed digital testing with automated test equipment (ATE), this practical resource is the first book to focus exclusively on this increasingly important topic. Featuring clear examples, this one-stop reference covers all critical aspects of the subject, from high-speed digital... |  |  Understanding Voice over IP Security (Artech House Telecommunications Library)
VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which... |
|
|
| Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 |