Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Distributed Computing: Principles, Algorithms, and Systems
Distributed Computing: Principles, Algorithms, and Systems
Designing distributed computing systems is a complex process requiring a solid understanding of the design problems and the theoretical and practical aspects of their solutions. This comprehensive textbook covers the fundamental principles and models underlying the theory, algorithms and systems aspects of distributed computing. Broad and detailed...
The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in...

Remote Sensing, Third Edition: Models and Methods for Image Processing
Remote Sensing, Third Edition: Models and Methods for Image Processing
With nearly ten years since publication of the Second Edition of Remote Sensing - Models and Methods for Image Processing , the Third Edition provides a needed and comprehensive update.

The changes include:

• Sensor updates, including the NASA satellites Terra, Aqua, and EO-1, and the commercial satellites IKONOS,
...
Windows Store App Development: C# and XAML
Windows Store App Development: C# and XAML

Summary

Windows Store App Development introduces C# developers to working with Windows Store apps. It provides full coverage of XAML, and addresses both app design and development. Following numerous carefully crafted examples, you'll learn about new Windows 8 features, the WinRT API, and .NET 4.5....

Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Interest in Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID and WSN systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on...
Ubiquitous Computing: Smart Devices, Environments and Interactions
Ubiquitous Computing: Smart Devices, Environments and Interactions
This book is primarily aimed at computer scientists and technologists in education and industry to enable them to keep abreast of the latest developments, across a diverse field of computing, all in one text. Its aim is to also to promote a much more cross disciplinary exchange of ideas within the sub fields of computing and between computer...
Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks presents abstract models that capture the cross layer interaction from the physical to transport layer in wireless network architectures including cellular, ad-hoc and sensor networks as well as hybrid wireless-wireline. The emphasis in the presentation is on describing the models and...
Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense

"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems...

Quantitative Remote Sensing of Land Surfaces
Quantitative Remote Sensing of Land Surfaces
Remote sensing has entered a new era in the twenty-first century with a series of operating satellites from the NASA Earth Observing System (EOS) program, other international programs, and commercial programs. Since November 2000 the first civilian spaceborne hyperspectral sensor, Hyperion, has observed land surfaces on the...
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy