 |
|
|
|
 Dictionary of Information SecurityIT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification... |  |  Telecommunications Engineering
Since the publication of the second edition of this highly acclaimed textbook, telecommunications has progressed at a rapid rate. Major advances continue to occur in mobile communications and broadband digital networks and services, sophisticated signal processing techniques are prevalent at increasingly higher bit rates, and digital systems... |  |  The Image Processing Handbook, Third EditionImage Processing Handbook covers methods for two different purposes:
improving the visual appearance of images to a human viewer
preparing images for measurement of the features and structures present
The handbook presents an extensive collection of image processing tools, enabling the user of computer-based system to... |
|
 KDE Programming Bible(IDG Books) A tutorial packed with examples, lucid explanations, and a complete widget reference, showing how to take full advantage of the K desktop and 2/Qt toolkit for Linux. The CD-ROM contains all of the examples from the text and KDE 2/Qt core files and libraries. System requirements: Intel 486+, 156 MB+ Hard drive space, 16MB+ RAM, CD-ROM... |  |  |  |  |
|
 |  |  Hacking a Terror Network: The Silent Threat of Covert ChannelsFrom a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of... |  |  |
|
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |