Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises

After the mainframe and personal computer eras, the third major era in computer science, ubiquitous computing, describes the state of technology in which networked computers would surround every user.

Ubiquitous Computing Technology for Real Time Enterprises combines the fundamental methods, algorithms, and concepts of...

Arduino Android Blueprints
Arduino Android Blueprints

Get the best out of Arduino by interfacing it with Android to create engaging interactive projects

About This Book

  • Learn how to interface with and control Arduino using Android devices
  • Discover how you can utilize the combined power of Android and Arduino for your own projects
  • ...
Distributed Network Data
Distributed Network Data

Build your own distributed sensor network to collect, analyze, and visualize real-time data about our human environment—including noise level, temperature, and people flow. With this hands-on book, you’ll learn how to turn your project idea into working hardware, using the easy-to-learn Arduino microcontroller and...

Computer Security Handbook, Set
Computer Security Handbook, Set

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer...

Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking
Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking

With Bluetooth Low Energy (BLE), smart devices are about to become even smarter. This practical guide demonstrates how this exciting wireless technology helps developers build mobile apps that share data with external hardware, and how hardware engineers can gain easy and reliable access to mobile operating systems.

This...

Linux Mint System AdministratorA¢a‚¬a„¢s Beginners Guide
Linux Mint System AdministratorA¢a‚¬a„¢s Beginners Guide

Probably the fastest route to becoming a Linux Mint system administrator, this book takes you from A–Z with clear step-by-step instructions, ranging from basic installation, to configuring networks, to troubleshooting. The perfect primer.

Overview

What you will learn from this book

...

High Performance Browser Networking: What every web developer should know about networking and web performance
High Performance Browser Networking: What every web developer should know about networking and web performance
How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from fundamental limitations that affect performance to major innovations for building even more powerful browser applications--including HTTP 2.0 and XHR improvements, Server-Sent Events...
XML Programming Using the Microsoft XML Parser
XML Programming Using the Microsoft XML Parser

XML Programming Using the Microsoft XML Parser is written for programmers interested in XML development using Microsoft technologies. Coupling valuable discussion of the Microsoft XML parser, Windows platform, and XML development software with the numerous core XML technologies, including XSLT, XPATH, SAX, DOM, XML Schema, and SOAP,...

Analog Electronics: Circuits, Systems and Signal Processing
Analog Electronics: Circuits, Systems and Signal Processing

The content has been carefully designed to meet the requirements of first and second year students of electronic engineering, communications engineering and telecommunications, following full honours degree programs or two-year courses including HNC/HND.

A companion website includes interactive spreadsheets to download.
...

Dynamic Secrets in Communication Security
Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...

Small Antenna Design (Communications Engineering Series)
Small Antenna Design (Communications Engineering Series)

As wireless devices and systems get both smaller and more ubiquitous, the demand for effective but small antennas is rapidly increasing. This book will describe the theory behind effective small antenna design and give design techniques and examples for small antennas for different operating frequencies. Design techniques are given for the...

Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Result Page: 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy