|
|
|
|
Security for Wireless Ad Hoc NetworksWireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature... | | Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these... | | Programming iOS 6
Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition, you’ll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 6 in a rigorous, orderly fashion—ideal whether... |
|
Android Hardware Interfacing with the BeagleBone Black
Design and implement Android apps that interface with your own custom hardware circuits and the BeagleBone Black
About This Book
-
Design custom apps that interact with the outside world via BeagleBone Black
-
Modify Android to recognize, configure, and communicate with sensors, LEDs, memory,...
| | | | Handbook of Software Quality AssuranceThe industry's top guide to software quality -- completely updated!
Practical techniques for mission-critical and commercial software.
Build a great software quality organization.
Prepare for ASQ Software Quality Engineer Certification.
Software quality assurance has never been more challenging -- nor more... |
|
|
|
|
Result Page: 43 42 41 40 39 38 37 36 35 34 33 |