Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

Digital Convergence - Libraries of the Future
Digital Convergence - Libraries of the Future
Clay tablets have been used to keep records from the earliest times. However, they were used for archives rather than libraries and consisted mainly of administrative records.Private and personal libraries containing books first appeared in Greece in the 5th century BC.The Royal Library of Alexandria was founded in the 3rd century BC and was...
Accounting Best Practices (Wiley Best Practices)
Accounting Best Practices (Wiley Best Practices)

The accounting department is a cost center. It does not directly generate revenues, but, rather, provides a fi xed set of services to the rest of the company, and is asked to do so at the lowest possible cost. Consequently, the accounting staff is called on to process transactions, write reports, create new processes, or investigate old...

RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

Network and System Security
Network and System Security

Network and System Security provides focused coverage of network and system security technologies. Explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors' respective areas of expertise....

Modern Antenna Handbook (v. 1)
Modern Antenna Handbook (v. 1)
Antennas and antenna systems are the eyes and ears of wireless communication systems, which have experienced an unprecedented rapid expansion. Part of this advancement has been attributed to contributions of antenna technology. These wireless systems, no matter how simple or complex, cannot operate efficiently unless they utilize...
Network and System Security, Second Edition
Network and System Security, Second Edition

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of...

Antenna Theory and Design
Antenna Theory and Design
The first edition of Antenna Theory and Design was published in 1981 and the second in 1998. This three-decade span has seen major expansions of antenna application areas, mainly in wireless communications. Along with technology advances has come public awareness of the presence and importance of antennas. Base station antennas are...
Seven Deadliest Wireless Technologies Attacks
Seven Deadliest Wireless Technologies Attacks

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more...

Voice Over IP Crash Course
Voice Over IP Crash Course
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability. Voice Over IP Crash Course offers practical technology coverage, while discussing the business, strategic and competitive implications of VoIP deployment in corporations. The book also...
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy