Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

The New How [Paperback]: Creating Business Solutions Through Collaborative Strategy
The New How [Paperback]: Creating Business Solutions Through Collaborative Strategy

What people are saying about The New How
 

"How are you going to get rid of your Air Sandwich if you don't even know what it is? Provocative and practical at the same time."
--Seth Godin, author of Linchpin

"The New How is informative and...

React Router Quick Start Guide: Routing in React applications made easy
React Router Quick Start Guide: Routing in React applications made easy

Learn how you can implement routing in a React Web/Native application using React-Router library

Key Features

  • Create nested routes and complex workflows for your applications
  • Learn Routing in server-side rendered applications and in Native mobile applications
  • ...
Google Flutter Mobile Development Quick Start Guide: Get up and running with iOS and Android mobile app development
Google Flutter Mobile Development Quick Start Guide: Get up and running with iOS and Android mobile app development

A fast-paced guide to get you started with cross-platform mobile application development with Google Flutter

Key Features

  • Understand the fundamentals of Flutter and get started with cross-platform mobile app development.
  • Learn about different widgets in Flutter and...
OSPF Network Design Solutions
OSPF Network Design Solutions

Network routing protocols have emerged as key enabling technologies in a computing world now dominated by connectivity. From a very high-level perspective, these routing protocols can be split into interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). In general, the routing techniques used by IGPs are based on either...

Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

Multi-objective Management in Freight Logistics: Increasing Capacity, Service Level and Safety with Optimization Algorithms
Multi-objective Management in Freight Logistics: Increasing Capacity, Service Level and Safety with Optimization Algorithms
The complexity of modern supply chains requires decision makers in logistics to work with a set of efficient (Pareto optimal) solutions, mainly to catch different economic aspects for which one optimal solution related to a single objective function is not able to capture entirely. Motivated by this, and by recent changes in global markets and the...
High Performance ASIC Design: Using Synthesizable Domino Logic in an ASIC Flow
High Performance ASIC Design: Using Synthesizable Domino Logic in an ASIC Flow

This book stems from my experience over the last few years in designing high-speed digital logic using ASIC design flows. I discovered that while it is possible to significantly improve performance in ASIC implementations with deep pipelining and careful physical design, a speed penalty still had to be paid due to their exclusive use of...

Silicon Photonics
Silicon Photonics
Silicon is a material where the extraordinary is made ordinary.1 This statement has been prompted by the rapid (exponential) development of the industry based on manufacturing silicon devices, which has seen enormous performance improvements and cost reductions over the last fifty years. Coming after the stone, iron, and...
Enterprise Information Systems VI
Enterprise Information Systems VI
This book contains the best papers of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004), held in Porto (Portugal) and organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control) in collaboration with PORTUCALENSE UNIVERSITY, who hosted the event.

Following the
...
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

DK Essential Managers: Achieving High Performance
DK Essential Managers: Achieving High Performance
There is no single technique for achieving excellence at work. High performance is attained through a combination of understanding yourself and your strengths and limitations; knowing what you want to achieve; and ensuring you are in an environment where you enjoy working and have some freedom to achieve what you want....
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy