 |
|
 SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure DevicesWhat seems routine today was not always so. The field of Si-based heterostructures rests solidly on the shoulders of materials scientists and crystal growers, those purveyors of the semiconductor “black arts” associated with the deposition of pristine films of nanoscale dimensionality onto enormous Si wafers with near infinite... |  |  |  |  Wireless Internet Security: Architecture and ProtocolsIn describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for... |
|
 Security Software Development: Assessing and Managing Security RisksExamining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development... |  |  Essential Software Testing: A Use-Case ApproachMuch has been written about the difficulty of software testing. Often these laments are accompanied by cautionary words about how careful one has to be to ensure testing is done properly. However, there is a dearth of resources that give practical guidance on the nuts and bolts of testing. Essential Software Testing: A Use-Case... |  |  iPhone For Dummies (Computer/Tech)The iPhone 3G is here! You’ll want to make the most of it, and iPhone For Dummies, 2nd Edition is ready to help. Master the multitouch interface, send text messages, enjoy rich-HTML e-mail, use GPS maps, and more, with this full-color guide to show you how!
Edward C. Baig and “Dr. Mac” Bob LeVitus, two giants of... |
|
 Network Security: Know It AllAll of the elements of network security together in a single volume written by the best and brightest experts in the field!
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
... |  |  Ophthalmology (Clinical Sciences)Like other medical specialties, ophthalmology undergoes constant enormous development in all its subspecialties. Assembling essential information is therefore an ever-recurring task, which needs to be done in various ways and for various target groups. The specialty of ophthalmology owes its development in recent years to numerous technical... |  |  Wireless Security and Cryptography: Specifications and ImplementationsAs the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which... |
|
 The Method of Moments in ElectromagneticsResponding to the need for a clear, up-to-date introduction to the field, The Method of Moments in Electromagnetics explores surface integral equations in electromagnetics and presents their numerical solution using the method of moments (MOM) technique. It provides the numerical implementation aspects at a nuts-and-bolts level... |  |  One Jump Ahead: Computer Perfection at CheckersThe new edition of this extraordinary book depicts the creation of the world champion checkers computer program, Chinook. In only two years, Chinook had become a worthy opponent to the world champion, and within four years had defeated all the world's top human players. Jonathan Schaeffer, the originator and leader of the Chinook team, details the... |  |  |
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |