Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Home Networking Do-It-Yourself For Dummies
Home Networking Do-It-Yourself For Dummies

Fifty years ago, most households had only one television and one telephone. As the price of these technological marvels dropped, families began purchasing additional televisions and telephones — and the home network was born!

Think about it: Your televisions are basically networked together on a cable network. Okay, not a...

New Directions of Modern Cryptography
New Directions of Modern Cryptography

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern...

Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Gain a deeper understanding of how Raspberry Pi works to get the results you want right in the palm of your hand. This book helps you understand the right connections and software to drive your Raspberry Pi into opening the worlds of programming, electronic experiments, system control, digital imaging, and the Internet of Things to you. ...
Design and Performance of 3G Wireless Networks and Wireless LANs
Design and Performance of 3G Wireless Networks and Wireless LANs
Cellular phones, especially those enabled by second-generation
telecommunication systems, have had tremendous impacts on our daily lives.
In some countries such as India, the number of cellular phone subscribers
has far exceeded the number of wired phone subscribers. Meanwhile, the
Internet has also significantly changed our
...
Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Raising Your Spirited Child Rev Ed: A Guide for Parents Whose Child Is More Intense, Sensitive, Perceptive, Persistent, and Energetic
Raising Your Spirited Child Rev Ed: A Guide for Parents Whose Child Is More Intense, Sensitive, Perceptive, Persistent, and Energetic
Newly revised, featuring the most up-to-date research, effective strategies, and real-life stories

The spirited child—often called "difficult" or "strong-willed"—possesses traits we value in adults yet find challenging in children. Research shows that spirited kids are wired to be "more"—by...

Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control (Control Engineering)
Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control (Control Engineering)
The purpose of this book is to initiate the newcomer into the control of computer and wireless communication networks, one of the fastest growing fields in the engineering world. Technical concepts, which are at the core of the design, implementation, research and invention of computer network and wireless communication network control protocols,...
The Physics of Information Technology
The Physics of Information Technology
"...throughout the text, Gershenfeld retains much of the conversational tone and spontaneity of a lecture. At its best, this makes for enjoyable reading, with interesting tidbits and asides that enliven the discussions....Gershenfeld's book will be valuable for physical scientists looking for an enjoyable introduction to the information...
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Contemporary Research in E-marketing
Contemporary Research in E-marketing

This innovative text brings the interdisciplinary work of e-marketing to one outlet, and fuels the cross-fertilization of ideas and dissemination of key research concepts.

Contemporary Research in E-Marketing brings the intrinsically inter-disciplinary work of e-marketing, by academic researchers from various fields, to one...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy