Home | Amazing | Today | Tags | Publishers | Years | Search 
Current Issues in Knowledge Management (Premier Reference Source)
Current Issues in Knowledge Management (Premier Reference Source)
As global enterprise grows increasingly reliant on electronic data, processes, and procedures, studies of the management of organizational knowledge are emergin at the forefront of critical research.

Current Issues in Knowledge Management combines cutting-edge research on the cultural, technical, organizational, and human...

DSP Software Development Techniques for Embedded and Real-Time Systems (Embedded Technology)
DSP Software Development Techniques for Embedded and Real-Time Systems (Embedded Technology)
Today's embedded and real-time systems contain a mix of processor types: off-the-shelf microcontrollers, digital signal processors (DSPs), and custom processors. The decreasing cost of DSPs has made these sophisticated chips very attractive for a number of embedded and real-time applications, including automotive, telecommunications, medical...
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Essentials of Telemedicine and Telecare
Essentials of Telemedicine and Telecare

Rapid advancement of telecommunications and information technology has created the potential for high-quality expert healthcare to be delivered when and where it is needed. This text charts the development of the telemedicine industry, defines its current scope and reveals the potential of new methodologies.

* Explains the main...

Building Interactive Worlds in 3D: Virtual Sets and Pre-visualization for Games, Film & the Web
Building Interactive Worlds in 3D: Virtual Sets and Pre-visualization for Games, Film & the Web
"Coming at the process of making interactive worlds from a non-gaming viewpoint proves to be a refreshing break...Provided is a version of the Virtools pre-visualisation package, which is used to set up the interaction between objects, cameras and players. And this is where Gauthier comes into his own with paticularly thought-provoking...
Mobile and Personal Communication Services and Systems
Mobile and Personal Communication Services and Systems
The idea and the scope for the book emerged from my own experience in attempting to acquire a good understanding of the rapidly evolving field of mobile and personal communication systems and standards, at a reasonable level of detail and breadth of coverage. Generally, one comes across either books that cover a range of technologies with very...
Software Process Quality : Management and Control
Software Process Quality : Management and Control
Software presents both an opportunity and a threat. Software runs our lives. The list of applications in which software is a critical component is endless: elevators, airlines, telecommunications, medical devices, education, and countless others. Data from the Software Engineering Institute indicates that approximately 60% of software development...
Emerging Location Aware Broadband Wireless Ad Hoc Networks
Emerging Location Aware Broadband Wireless Ad Hoc Networks
Emerging Location Aware Broadband Wireless Ad Hoc Networks is a compilation of new material on wireless networking and technology addressing several technical challenges in the field. The contributions are authored by distinguished experts who presented experimental results on their work at the recent International Symposium on...
Wavelets and Their Applications (Digital Signal and Image Processing series)
Wavelets and Their Applications (Digital Signal and Image Processing series)
Showing how wavelets combine signal in image processing, mathematics, physics, and electrical engineering, this introduction to wavelet technology helps engineers master the basic techniques for using wavelets in such applications as image compression, turbulence, human vision, radar, and earthquake prediction. Among the topics covered are the...
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Take command of core technologies at the heart of all telecommunications systems with the first book expressly designed to help you apply, reuse, and enhance building-block components from one generation of networks to the next. This unique problem-solver unravels the complexities behind such technologies as synchronization, multiple access,...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy