Home | Amazing | Today | Tags | Publishers | Years | Search 
Internet Technologies Handbook: Optimizing the IP Network
Internet Technologies Handbook: Optimizing the IP Network
The Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
The Zope Book (Landmark)
The Zope Book (Landmark)
The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope...
Spatial Databases: With Application to GIS (The Morgan Kaufmann Series in Data Management Systems)
Spatial Databases: With Application to GIS (The Morgan Kaufmann Series in Data Management Systems)

"Spatial Databases covers all of the major themes of the field -- representation, query languages, computational geometry, spatial indexing -- using geographic information systems as the principal application domain and motivation. It is an excellent introduction for computer science professionals interested in exploring GIS, and an...

Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
The Linux Cookbook, Second Edition
The Linux Cookbook, Second Edition
The Linux Cookbook, 2nd Edition is your guide to getting the most out of Linux. Organized by general task (such as working with text, managing files, and manipulating graphics), each section contains a series of step-by-step recipes that help you to get your work done quickly and efficiently, most often from the command line. Nearly 50...
Photographic Lighting: Essential Skills, Fourth Edition (Photography Essential Skills)
Photographic Lighting: Essential Skills, Fourth Edition (Photography Essential Skills)
This book is fantastic! ...The terminology is easy to understand and techniques are explained in a no nonsense format. Excellent for beginners to intermediate photographers. I have had this book for a few months now and through practicing and completing the revision exercises, I have a better understanding of the techniques used for photograhic...
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)

It's hard to remember a world without the Internet. We now take for granted that we can access our bank accounts and health records, get driving directions, talk to friends, and shop, all on the Internet. Many companies couldn't survive without it because it is their link to their customers.

But the...

Advances in Chinese Spoken Language Processing
Advances in Chinese Spoken Language Processing
After decades of research activity, Chinese spoken language processing (CSLP) has advanced considerably both in practical technology and theoretical discovery. In this book, the editors provide both an introduction to the field as well as unique research problems with their solutions in various areas of CSLP. The contributions represent pioneering...
High Performance Embedded Computing Handbook: A Systems Perspective
High Performance Embedded Computing Handbook: A Systems Perspective
Embedded systems technology involves a range of topics, including analog-to-digital conversion and application-specific integrated circuit design. From the history of high-performance computing to a discussion of future directions, High Performance Embedded Computing Handbook offers comprehensive coverage of all aspects of these...
Processor Description Languages, Volume 1 (Systems on Silicon)
Processor Description Languages, Volume 1 (Systems on Silicon)
The only book providing comprehensive coverage of all modern processor description languages; a must-have reference for embedded processor designers!

Efficient design of embedded processors plays a critical role in embedded systems design. Processor description languages and their associated specification, exploration and
...
Result Page: 670 669 668 667 666 665 664 663 662 661 660 659 658 657 656 655 654 653 652 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy