Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyber Crime Investigator's Field Guide, Second Edition
Cyber Crime Investigator's Field Guide, Second Edition
In the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we...
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
...
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
Speech and Audio Processing in Adverse Environments (Signals and Communication Technology)
Speech and Audio Processing in Adverse Environments (Signals and Communication Technology)
The book reflects the state of the art in important areas of speech and audio signal processing. It presents topics which are missed so far and most recent findings in the field. Leading international experts report on their field of work and their new results.

Considerable amount of space is covered by multi-microphone systems, specific...

Signaling And Switching For Packet Telephony (Artech House Telecommunications Library)
Signaling And Switching For Packet Telephony (Artech House Telecommunications Library)
Voice telephony was arguably the first telecommunications service to achieve truly widespread deployment. Data services came into their own much later. To be sure, data telecommunication (in the form of smoke signals and other visual semaphore schemes, for example) has been around for a very long time. Note also that the telegraph preceded the...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Practical Aspects of Interview and Interrogation-Soft Cover
Practical Aspects of Interview and Interrogation-Soft Cover
What makes a person confess to a crime he did not commit? Was he coerced? Is he trying to protect someone else? Interrogation has come under attack as opponents focus on false confessions. However, most cases are still resolved by confession, not forensic evidence. Among the new topics covered in the Second Edition of this bestselling book,...
Open Source: Technology and Policy
Open Source: Technology and Policy
"Provide[s] a well laid out review of the open source movement, including its technologies, policies, and impact and implications.... Overall, this book ties together the many interlocking pieces within the development and history of the open source movement." -- A. Hollister, State University of Cortland, CHOICE

The open
...
Data Warehousing: Using the Wal-Mart Model (The Morgan Kaufmann Series in Data Management Systems)
Data Warehousing: Using the Wal-Mart Model (The Morgan Kaufmann Series in Data Management Systems)
At 70 terabytes and growing, Wal-Mart's data warehouse is still the world's largest, most ambitious, and arguably most successful commercial database. Written by one of the key figures in its design and construction, Data Warehousing: Using the Wal-Mart Model gives you an insider's view of this enormous project. Continuously drawing from...
IP Multicast with Applications to IPTV and Mobile DVB-H
IP Multicast with Applications to IPTV and Mobile DVB-H

Get a clear picture of IP Multicast applications for delivering commercial high-quality video services

This book provides a concise guide to current IP Multicast technology and its applications, with a focus on IP-based Television (IPTV) and Digital Video Broadcast-Handheld (DVB-H) applications—areas of tremendous commercial...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy