Home | Amazing | Today | Tags | Publishers | Years | Search 
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking...
Hacking the Cable Modem: What Cable Companies Don't Want You to Know
Hacking the Cable Modem: What Cable Companies Don't Want You to Know
In the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable...
Computer Science Handbook, Second Edition
Computer Science Handbook, Second Edition

The second edition of this elemental handbook reviews the current state of theory and practice in the field while emphasizing a more practical/applied approach to IT topics such as information management, net-centric computing, and human computer interaction. With a complete revision of its sections on software engineering, architecture, and...

The Definitive Guide to Java Swing, Third Edition
The Definitive Guide to Java Swing, Third Edition

Fully updated for the 1.5 edition of the Java 2 Platform, the third edition of this praised book is a one-stop resource for serious Java developers. This book shows you the parts of Java Swing API that you will use daily to create graphical user interfaces (GUI). You will also learn about the Model-View-Controller architecture that lies...

MicroC OS II: The Real Time Kernel (With CD-ROM)
MicroC OS II: The Real Time Kernel (With CD-ROM)
MicroC/OS II Second Edition describes the design and implementation of the MicroC/OS-II real-time operating system (RTOS). In addition to its value as a reference to the kernel, it is an extremely detailed and highly readable design study particularly useful to the embedded systems student. While documenting the design and implementation of the...
User Interface Design for Programmers
User Interface Design for Programmers

Most programmers' fear of user interface (UI) programming comes from their fear of doing UI design. They think that UI design is like graphic design--the mysterious process by which creative, latte-drinking, all-black-wearing people produce cool-looking, artistic pieces. Most programmers see themselves as analytic, logical thinkers...

Professional Visual Basic 6 Web Programming
Professional Visual Basic 6 Web Programming
Visual Basic 6 is ready to take on the Internet with a variety of options for Web development, both on the server and client side. That's the argument of Professional VB6 Web Programming, a wide-ranging tour of the strengths of VB for Internet development on the Microsoft DNA platform. This book provides essential information for...
Creating your MySQL Database: Practical Design Tips and Techniques
Creating your MySQL Database: Practical Design Tips and Techniques
This book is an innovative and essential short guide for everyone on how to structure your data and set-up your MySQL database tables efficiently and easily. If you're creating a dynamic web application using open-source tools, then you're probably going to be setting up a MySQL database. Getting the design of this database right for your...
Workflow Modeling: Tools for Process Improvement and Application Development
Workflow Modeling: Tools for Process Improvement and Application Development
Just when process orientation has become mainstream thinking for business people and
systems people alike, it seems that the flow of process-oriented literature has pretty well
stopped. So here we are, thousands of us, up to our necks in process improvement and
information systems projects, finding that there is a real shortage of
...
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition)
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition)
The all-time best-selling TCP/IP book, this is still the reference for anyone who wants to learn about or work with the TCP/IP protocol suite. Justly renowned for its clarity and accessibility,this superb text covers wide area Internet backbones as well as local area network technologies like FDDI and Ethernet. This is volume 1 of a 3 part set...
Secure Your Network for Free
Secure Your Network for Free
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for
...
Mobile Radio Networks: Networking and Protocols
Mobile Radio Networks: Networking and Protocols
The continuing growth of the Global System for Mobile Communications (GSM) based mobile telephones has brought with it increasingly rapid growth in interest in mobile communications interconnect problems and standards. For the rapid proliferation of mobile communications to be sustained without overloading the system, harmonization of the networks...
Result Page: 553 552 551 550 549 548 547 546 545 544 543 542 541 540 539 538 537 536 535 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy