Home | Amazing | Today | Tags | Publishers | Years | Search 
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

The Finite Element Method: Theory, Implementation, and Applications (Texts in Computational Science and Engineering)
The Finite Element Method: Theory, Implementation, and Applications (Texts in Computational Science and Engineering)

This book gives an introduction to the finite element method as a general computational method for solving partial differential equations approximately. Our approach is mathematical in nature with a strong focus on the underlying mathematical principles, such as approximation properties of piecewise polynomial spaces, and variational...

JavaMail API
JavaMail API
Email was the Internet’s first killer app. One of the most frequently asked questions about Java is how to send email from a Java applet or application. While it’s certainly possible to write a Java program that uses sockets to communicate with mail servers, this requires detailed knowledge of some fairly...
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security.? This...

Smart Card Handbook
Smart Card Handbook

The most comprehensive book on state-of-the-art smart card technology available

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...

SAS Storage Architecture: Serial Attached SCSI
SAS Storage Architecture: Serial Attached SCSI
The SAS Storage Architecture book is intended as a tutorial and to serve as classroom materials for the training MindShare delivers on this subject. It should be considered a companion to the SAS standard, helping to clarify and explain the concepts and provide the motivation for decisions that were made in the creation of the...
Implementing SSL / TLS Using Cryptography and PKI
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or...

XML: Visual QuickStart Guide (2nd Edition)
XML: Visual QuickStart Guide (2nd Edition)
What is XML? XML, or eXtensible Markup Language, is a specification for storing information. It is also a specification for describing the structure of that information. And while XML is a markup language (just like HTML), XML has no tags of its own. It allows the person writing the XML to create whatever tags they need....
SELinux System Administration
SELinux System Administration

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security...

Mobile Backhaul
Mobile Backhaul

Comprehensive coverage of IP/MPLS/Ethernet backhaul technologies and solutions for 3GPP mobile network systems such as LTE, HSPA and GPRS

Focusing on backhaul from a radio network viewpoint, Mobile Backhaul combines perspectives on mobile networks and transport network technologies, focusing on mobile backhaul specific...

Human Reproductive Biology, Fourth Edition
Human Reproductive Biology, Fourth Edition

The fourth edition of Human Reproductive Biology emphasizes the biological and biomedical aspects of human reproduction, explains advances in reproductive science and discusses the choices and concerns of today. Generously illustrated in full color, the text provides current information about human reproductive anatomy and...

Global Energy Policy and Security (Lecture Notes in Energy)
Global Energy Policy and Security (Lecture Notes in Energy)

Despite efforts to increase renewables, the global energy mix is still likely to be dominated by fossil-fuels in the foreseeable future, particularly gas for electricity and oil for land, air and sea transport. The reliance on depleting conventional oil and natural gas resources  and the geographic distribution of these reserves can have...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy