Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Enabling eBusiness - Integrating Technologies Architectures & Applications
Enabling eBusiness - Integrating Technologies Architectures & Applications
This book describes the technical architecture and components that can be integrated in order to provide a comprehensive and robust infrastructure on which to build successful e-Business. It is essential reading for technical and functional team leaders and strategists, who analyse the options, limitations and possibilities for new technology and...
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 (with a formal ISO/IEC designation ISO/IEC 14496) standardization was initiated in 1994 to address the requirements of the rapidly converging telecommunication, computer, and TV/film industries. MPEG-4 had a mandate to standardize algorithms for audiovisual coding in multimedia applications, digital television, interactive graphics, and...
DotNetNuke 5 User's Guide: Get Your Website Up and Running (Wrox Programmer to Programmer)
DotNetNuke 5 User's Guide: Get Your Website Up and Running (Wrox Programmer to Programmer)

An authoritative introduction to implementing DotNetNuke Web sites, by experienced DotNetNuke implementers and trainers

An impressive author team shows you how to easily build Web sites with a variety of content features - no programming experience required.

If your goal is to build the site without worrying about the...

Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle.

Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic...

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Optimization and Security Challenges in Smart Power Grids (Energy Systems)
Optimization and Security Challenges in Smart Power Grids (Energy Systems)

This book provides an overview of state-of-the-art research on “Systems and Optimization Aspects of Smart Grid Challenges.” The authors have compiled and integrated different aspects of applied systems optimization research to smart grids, and also describe some of its critical challenges and requirements.

The promise...

SQL Server 7 Backup & Recovery
SQL Server 7 Backup & Recovery
Protect your organization's most valuable asset--its data. Develop and implement a thorough data protection solution for your SQL Server 7 database environment. SQL Server 7 Backup & Recovery is your one-stop resource for planning, developing, implementing, and managing backup and restore procedures. Learn to execute data protection strategies,...
Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
The influence of embedded systems is constantly growing. Increasingly powerful and versatile devices are being developed and put on the market at a fast pace. The number of features is increasing, and so are the constraints on the systems concerning size, performance, energy dissipation and timing predictability. Since most systems today use a...
Manufacturing Execution System - MES
Manufacturing Execution System - MES
The classical factory fades into history as production plants today develop into modern service centers. Problems in management arise for which many companies are not yet prepared: economic efficiency of modern added value is not a property of products alone but of the process. Decisive potential in business now is a question of process capability,...
Java Web Services: Up and Running
Java Web Services: Up and Running
This example-driven book offers a thorough introduction to Java's APIs for XML Web Services (JAX-WS) and RESTful Web Services (JAX-RS). Java Web Services: Up and Running takes a clear, pragmatic approach to these technologies by providing a mix of architectural overview, complete working code examples, and short yet precise instructions for...
ZigBee Wireless Networks and Transceivers
ZigBee Wireless Networks and Transceivers
ZigBee is a short-range wireless networking standard backed by such industry leaders as Motorola, Texas Instruments, Philips, Samsung, Siemens, Freescale, etc. It supports mesh networking, each node can transmit and receive data, offers high security and robustness, and is being rapidly adopted in industrial, control/monitoring, and medical...
unlimited object storage image
Result Page: 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy