Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Network and System Security
Network and System Security

Network and System Security provides focused coverage of network and system security technologies. Explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors' respective areas of expertise....

Recent Developments in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2017 (Advances in Intelligent Systems and Computing, 752)
Recent Developments in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2017 (Advances in Intelligent Systems and Computing, 752)

This book offers a collection of high-quality, peer-reviewed research papers presented at the International Conference on Intelligent Computing, Communication and Devices (ICCD 2017), discussing all dimensions of intelligent sciences – intelligent computing, intelligent communication, and intelligent devices.

...

Getting Started with RFID: Identify Objects in the Physical World with Arduino
Getting Started with RFID: Identify Objects in the Physical World with Arduino
The process of identifying physical objects is such a fundamental part of our experience that we seldom think about how we do it. We use our senses, of course: we look at, feel, pick up, shake and listen to, smell, and taste objects until we have a reference for them—then we give them a label. The whole...
Arduino + Android Projects for the Evil Genius: Control Arduino with Your Smartphone or Tablet
Arduino + Android Projects for the Evil Genius: Control Arduino with Your Smartphone or Tablet

TEAM ARDUINO UP WITH ANDROID FOR SOME MISCHIEVOUS FUN!

Filled with practical, do-it-yourself gadgets, Arduino + Android Projects for the Evil Genius shows you how to create Arduino devices and control them with Android smartphones and tablets. Easy-to-find equipment and components are used for all the projects in the...

Practical .NET 2.0 Networking Projects
Practical .NET 2.0 Networking Projects
Practical .NET 2.0 Networking Projects demonstrates some of the key networking technologies that are being made easily accessible through .NET Framework 2.0. It discusses communication between wired machines and between networks and mobile devices. The book teaches you about the technologies by walking you through sample projects in a...
Wireless Positioning Technologies and Applications (Technology and Applications)
Wireless Positioning Technologies and Applications (Technology and Applications)
At last--here's a comprehensive book that puts full details on all short-range wireless-positioning methods at your command for instant access and use. This one-stop resource surveys each technique's theory of operation, advantages and disadvantages, applicability in different domains, implementation procedures, and accuracy to help you select the...
Pro Mapping in BizTalk Server 2009 (Expert's Voice in BizTalk)
Pro Mapping in BizTalk Server 2009 (Expert's Voice in BizTalk)
Learn good map design techniques for BizTalk Server and you will make huge differences to the processing speed of your implementation, as well as to the scalability and maintainability of your code. Regardless of your experience, expert authors Jim Dawson and John Wainwright ensure you make the right choices to...
Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)

Telecommunications Essentials, Second Edition, provides a comprehensive overview of the rapidly evolving world of telecommunications. Providing an in-depth, one-stop reference for anyone wanting to get up to speed on the $1.2 trillion telecommunications industry,...

Security for Wireless Sensor Networks (Advances in Information Security)
Security for Wireless Sensor Networks (Advances in Information Security)
From the reviews:

 

"Security for Wireless Sensor Networks provides a detailed overview of wireless sensor security issues, describing techniques for protecting networks and the results of recent studies in wireless sensor network security. Aimed at network security researchers and designers, this volume takes a high-level...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy