Home | Amazing | Today | Tags | Publishers | Years | Search 
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained
UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained

UMTS is real. In a continuously growing number of countries we can walk in the stores of mobile network operators or resellers and take UMTS PC cards or even third-generation (3G) phones home and use them instantly. Every day the number of equipments and their feature sets gets broader. The “dream” of multimedia on mobile...

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

CMOS Integrated Switching Power Converters: A Structured Design Approach
CMOS Integrated Switching Power Converters: A Structured Design Approach

The application framework of the presented research work is stablished in the area of the low-power portable stand-alone devices. Considering as a paradigm application the implementation of future portable terminals for telecommunications, two opposed trends coexist that determine the need for an optimized energy management. An...

Critical Code: Software Producibility for Defense
Critical Code: Software Producibility for Defense

The Committee for Advancing Software-Intensive Systems Producibility was appointed by the National Research Council (NRC) and convened under the auspices of the NRC’s Computer Science and Telecommunications Board (CSTB) to assess the nature of the national investment in software research and, in particular, to consider ways to...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
The world's first public GSM call was made on 1st July 1991 in a city park of Helsinki, Finland. That event is now regarded as the birthday of the second generation mobile telephony. GSM has been an overwhelming success, which was difficult to predict at that early stage. In the past 10 years GSM has become a truly global...
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Wireless communications is growing at a phenomenal rate. From 1991 to 1999, the number of subscribers increased from about 25 million to over 250 million. Incredibly, over the next seven years, the number. of subscribers is expected to quadruple, to over 1 billion [ 1]. That growth rate is faster than that of any other consumer...
Electro-Optics Handbook
Electro-Optics Handbook

It’s often difficult to predict which areas of a field will become rejuvenated and grow rapidly or spin off to fit with another to form something new. The field of electro-optics is also unpredictable, but currently it has numerous forces acting on it. First is the development of new optical sources such as ultrafast lasers and fiber...

Connections for the Digital Age: Multimedia Communications for Mobile, Nomadic and Fixed Devices
Connections for the Digital Age: Multimedia Communications for Mobile, Nomadic and Fixed Devices

Explores and analyzes past and current technologies and trends in multimedia communication

Digital natives—those persons born in the digital age—have an ever-widening range of wireless-enabled devices at their disposal. They are the drivers of multimedia communications, continually seeking out the technologies...

Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany

The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...

Mobile and Wireless Communications for IMT-Advanced and Beyond
Mobile and Wireless Communications for IMT-Advanced and Beyond
This book was prompted by the desire to fill the gap between theoretical descriptions and a more pedagogical description of the main technological components of International Mobile Telecommunications Advanced (IMT-Advanced) such as Radio Resource Management (RRM), Carrier

Aggregation (CA), improved MIMO support, and
...
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy