Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

5G-Enabled Vehicular Communications and Networking (Wireless Networks)
5G-Enabled Vehicular Communications and Networking (Wireless Networks)

This book investigates and reviews recent advanced techniques and important applications in vehicular communications and networking (VCN) from a novel perspective of the combination and integration of VCN and connected vehicles, which provides a significant scientific and technical support for future 5G-based...

Engineering and Operations of System of Systems
Engineering and Operations of System of Systems

Modern engineering systems are complex and multi-faceted, and must be flexible, adaptable, and fully integrated with the supply chain and other stakeholders to deliver an effective level of performance. Therefore, this book aims to create an operational view and new understanding of modern system design, commissioning, operation,...

Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)
Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)

This informative text/reference presents a detailed review of the state of the art in industrial sensor and control networks. The book examines a broad range of applications, along with their design objectives and technical challenges. The coverage includes fieldbus technologies, wireless communication technologies, network...

Differential Equations For Dummies
Differential Equations For Dummies
Power your way through ordinary and singular points

Understand differential equations through practical tips and examples

Do differential equations cause you distress? No worries! This friendly guide explains this intimidating subject in plain English, walking you step by step through all...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Integral Calculus, 3D Geometry & Vector Booster with Problems & Solutions
Integral Calculus, 3D Geometry & Vector Booster with Problems & Solutions
INTEGRAL CALCULUS, 3D GEOMETRY & VECTOR BOOSTER with Problems & Solutions for JEE Main and Advanced is meant for aspirants preparing for the entrance examinations of different technical institutions, especially NIT/IIT/BITSAT/ IISc. In writing this book, I have drawn heavily from my long teaching experience at National Level...
Progress in Life Cycle Assessment 2019 (Sustainable Production, Life Cycle Engineering and Management)
Progress in Life Cycle Assessment 2019 (Sustainable Production, Life Cycle Engineering and Management)

This book covers the latest developments in life cycle assessment LCA both in terms of methodology and its application in various research areas. It includes methodological questions as well as case studies concerning energy and mobility, materials and engineering, sustainable construction and future technologies. With numerous...

The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone...
Distributed Energy Management of Electrical Power Systems (IEEE Press Series on Power and Energy Systems)
Distributed Energy Management of Electrical Power Systems (IEEE Press Series on Power and Energy Systems)

Go in-depth with this comprehensive discussion of distributed energy management

Distributed Energy Management of Electrical Power Systems provides the most complete analysis of fully distributed control approaches and their applications for electric power systems available today. Authored by four respected...

High Dynamic Range Imaging, Second Edition: Acquisition, Display, and Image-Based Lighting
High Dynamic Range Imaging, Second Edition: Acquisition, Display, and Image-Based Lighting

This landmark book is the first to describe HDRI technology in its entirety and covers a wide-range of topics, from capture devices to tone reproduction and image-based lighting. The techniques described enable you to produce images that have a dynamic range much closer to that found in the real world, leading to an unparalleled visual...

Voice over IP Fundamentals (2nd Edition)
Voice over IP Fundamentals (2nd Edition)

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter,
...

unlimited object storage image
Result Page: 379 378 377 376 375 374 373 372 371 370 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy