Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Enabling eBusiness - Integrating Technologies Architectures & Applications
Enabling eBusiness - Integrating Technologies Architectures & Applications
This book describes the technical architecture and components that can be integrated in order to provide a comprehensive and robust infrastructure on which to build successful e-Business. It is essential reading for technical and functional team leaders and strategists, who analyse the options, limitations and possibilities for new technology and...
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.

Cognitive networks are the future, and they are needed simply because they enable users to focus on things other...

Cities in a Globalizing World: Governance, Performance, And Sustainability (Wbi Learning Resources Series)
Cities in a Globalizing World: Governance, Performance, And Sustainability (Wbi Learning Resources Series)
World Bank research shows that in 2003, 48 percent of the world’s population (3 billion people) lived in urban areas—a 33 percent increase from the 1990 level. By 2020, 4.1 billion people (55 percent of the world’s population) will live in urban areas. Almost 94 percent of the increase will occur in developing countries. By 2015,...
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects who know enterprise development but are new to enterprise service buses (ESBs) and service–oriented architecture (SOA) development. This is the first book to cover a practical approach to SOA using the BEA...
Handbook on Information Technology in Finance (International Handbooks on Information Systems)
Handbook on Information Technology in Finance (International Handbooks on Information Systems)
This Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary research in the intersection between IT and finance. Included are recent trends and challenges, IT systems and architectures in finance, essential developments and case studies on management information systems, service...
Multi-Camera Networks: Principles and Applications
Multi-Camera Networks: Principles and Applications
This book is the definitive reference in multi-camera networks. It gives clear guidance on the conceptual and implementation issues involved in the design and operation of multi-camera networks, as well as presenting the state-of-the-art in hardware, algorithms and system development. The book is broad in scope, covering smart camera architectures,...
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. It contains a collection of the recent advances in the technology ranging from...
The Ethics of Research Biobanking
The Ethics of Research Biobanking
Biobanking, i.e. storage of biological samples or data emerging from such samples for diagnostic, therapeutic or research purposes, has been going on for decades. However, it is only since the mid 1990s that these activities have become the subject of considerable public attention, concern and debate. This shift in climate is due to several...
Dependability of Networked Computer-based Systems (Springer Series in Reliability Engineering)
Dependability of Networked Computer-based Systems (Springer Series in Reliability Engineering)

This book is meant for research scholars, scientists and practitioners involved with the application of computer-based systems in critical applications. Ensuring dependability of systems used in critical applications is important due to the impact of their failures on human life, investment and environment. The individual aspects of...

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Mobile Backhaul
Mobile Backhaul

Comprehensive coverage of IP/MPLS/Ethernet backhaul technologies and solutions for 3GPP mobile network systems such as LTE, HSPA and GPRS

Focusing on backhaul from a radio network viewpoint, Mobile Backhaul combines perspectives on mobile networks and transport network technologies, focusing on mobile backhaul specific...

unlimited object storage image
Result Page: 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy