Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Transforming Enterprise Cloud Services
Transforming Enterprise Cloud Services

Transforming Enterprise Cloud Services addresses the fundamental ideology of Cloud Services and how enterprises in commercial, federal, and defense industries can transform their current information technology and management models to adopt this new method. It goes beyond the mere description of service frameworks in relation to...

Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

Smart Card Handbook
Smart Card Handbook

The most comprehensive book on state-of-the-art smart card technology available

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...

Network Security Through Data Analysis: Building Situational Awareness
Network Security Through Data Analysis: Building Situational Awareness

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what...

Mastering Docker
Mastering Docker

Rethink what's possible with Docker – become an expert in the innovative containerization tool to unlock new opportunities in the way you use and deploy software

About This Book

  • Create highly scalable applications and services using the Linux container virtualization paradigm
  • ...
Internet of Things Programming with JavaScript
Internet of Things Programming with JavaScript
The Raspberry Pi Zero is a powerful, low-cost, credit-card sized computer, which lends itself perfectly to begin the controller of sophisticated home automation devices. Using the available on-board interfaces, the Raspberry Pi Zero can be expanded to allow the connection of a virtually infinite number of security sensors and...
Advances in Networked-based Information Systems: The 22nd International Conference on Network-Based Information Systems (NBiS-2019) (Advances in Intelligent Systems and Computing)
Advances in Networked-based Information Systems: The 22nd International Conference on Network-Based Information Systems (NBiS-2019) (Advances in Intelligent Systems and Computing)

This book focuses on the emerging areas of information networking and its applications, presenting the latest innovative research and development techniques from both theoretical and practical perspectives.

Today’s networks and information systems are evolving rapidly, and there are new trends and applications in...

ASP.NET in a Nutshell, Second Edition
ASP.NET in a Nutshell, Second Edition
Newly updated for Visual Studio .NET 2003, the second edition of this book includes fresh information on application and web service development, custom controls, data access, security, deployment, and error handling, new material on web application development for mobile devices, plus an overview of the class libraries.

ASP.NET is the
...
Operating Systems Design and Implementation (3rd Edition) (Prentice Hall Software Series)
Operating Systems Design and Implementation (3rd Edition) (Prentice Hall Software Series)
The definitive, up-to-date introduction to operating systems:

Core principles plus hands-on examples with the new MINIX 3 operating system

 

The...

Sams Teach Yourself MySQL in 21 Days
Sams Teach Yourself MySQL in 21 Days
Sams Teach Yourself MySQL in 21 Days teaches you to design and implement your own open source database. Topics include: Designing and Creating your First Database, Normalizing your Data, Adding Tables, Columns, and Indexes, MySQL Data Types, Importing and Exporting Data, Locks and Keys, Building a MyODBC Interface, Building a Perl Interface,...
Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.

...

Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
unlimited object storage image
Result Page: 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy