Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Security and Cryptography: Specifications and Implementations
Wireless Security and Cryptography: Specifications and Implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which...
Ophthalmology (Clinical Sciences)
Ophthalmology (Clinical Sciences)
Like other medical specialties, ophthalmology undergoes constant enormous development in all its subspecialties. Assembling essential information is therefore an ever-recurring task, which needs to be done in various ways and for various target groups. The specialty of ophthalmology owes its development in recent years to numerous technical...
Network Security: Know It All
Network Security: Know It All
All of the elements of network security together in a single volume written by the best and brightest experts in the field!

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
...
iPhone For Dummies (Computer/Tech)
iPhone For Dummies (Computer/Tech)
The iPhone 3G is here! You’ll want to make the most of it, and iPhone For Dummies, 2nd Edition is ready to help. Master the multitouch interface, send text messages, enjoy rich-HTML e-mail, use GPS maps, and more, with this full-color guide to show you how!

Edward C. Baig and “Dr. Mac” Bob LeVitus, two giants of...

Essential Software Testing: A Use-Case Approach
Essential Software Testing: A Use-Case Approach
Much has been written about the difficulty of software testing. Often these laments are accompanied by cautionary words about how careful one has to be to ensure testing is done properly. However, there is a dearth of resources that give practical guidance on the nuts and bolts of testing. Essential Software Testing: A Use-Case...
Security Software Development: Assessing and Managing Security Risks
Security Software Development: Assessing and Managing Security Risks
Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development...
Wireless Internet Security: Architecture and Protocols
Wireless Internet Security: Architecture and Protocols
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for...
Information Technology Policy and the Digital Divide: Lessons for Developing Countries
Information Technology Policy and the Digital Divide: Lessons for Developing Countries
The proliferation of new information technologies throughout the world has raised some important questions for policymakers as to how developing countries can benefit from their diffusion. This important volume compares the advantages and disadvantages of the IT revolution through detailed studies of a variety of developed and developing nations...
SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure Devices
SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure Devices
What seems routine today was not always so. The field of Si-based heterostructures rests solidly on the shoulders of materials scientists and crystal growers, those purveyors of the semiconductor “black arts” associated with the deposition of pristine films of nanoscale dimensionality onto enormous Si wafers with near infinite...
Intelligent Network Video: Understanding Modern Video Surveillance Systems
Intelligent Network Video: Understanding Modern Video Surveillance Systems
This is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Pro Tools for Music Production, Second Edition: Recording, Editing and Mixing
Pro Tools for Music Production, Second Edition: Recording, Editing and Mixing
If you are a music producer, recording engineer, musician, or composer there is definitely something in this book for you. If you are about to purchase new equipment, wish to troubleshoot technical problems, need guidance on how to achieve professional sounding results, or are looking for inspiration for new ideas - keep this book by your side....
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy