Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
Making Sense of Motherhood: A Narrative Approach
Making Sense of Motherhood: A Narrative Approach
Becoming a mother changes lives in many ways, and this book explores how women try to make sense of, and narrate their experiences of, first-time motherhood in industrialized society. It charts the social, cultural and moral contours of contemporary motherhood and engages with sociological and feminist debates on how selves are constituted,...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
Wireless sensor networks will revolutionise applications such as environmental monitoring, home automation, and logistics.

Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the most important issues and questions that have to be addressed in a wireless sensor network....

Microsoft  Windows  SharePoint  Services Inside Out
Microsoft Windows SharePoint Services Inside Out
Take your Windows SharePoint Services experience to the next level! Designed for advanced users, this supremely organized reference packs all the information you need to master every major tool, task, and enhancement in Windows SharePoint Serviceswithout the fluff. Discover how to simplify information sharing, make team collaboration more...
Foundations of Analog and Digital Electronic Circuits (The Morgan Kaufmann Series in Computer Architecture and Design)
Foundations of Analog and Digital Electronic Circuits (The Morgan Kaufmann Series in Computer Architecture and Design)

The book issued by two professors at MIT is intended to initiate a new approach in presenting and developing analog and digital electronics. Traditionally, analog and digital elements and circuits are given in separate courses. Here, the authors want to show that in presenting both topics (analog and digital), a deeper insight of the real...

Clinical Skills for the Ophthalmic Examination: Basic Procedures (The Basic Bookshelf for Eyecare Professionals)
Clinical Skills for the Ophthalmic Examination: Basic Procedures (The Basic Bookshelf for Eyecare Professionals)

The step-by-step, instructional guide for the most common ophthalmic instruments and procedures has been updated to a second edition. Clinical Skills for the Ophthalmic Examination: Basic Procedures, Second Edition provides details on tests frequently performed in the office and provides instructions on the proper way to...

Emerging Pathologies in Cardiology: Proceedings of the Mediterranean Cardiology Meeting 2005
Emerging Pathologies in Cardiology: Proceedings of the Mediterranean Cardiology Meeting 2005

Clinical practice is evolving at a rapid pace,nowhere more so than in the field of cardiology.Acute Coronary Syndromes, Sudden Cardiac Death, Heart Failure, Atrial Fibrillation,Syncope,and Prevention of Global Cardiovascular Risk are the main Emerging Pathologies to which many investigators are addressing their researches. Less than 10 years...

Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions

Due to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the...

Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
We describe in this book, new methods for intelligent pattern recognition using soft computing techniques. Soft Computing (SC) consists of several computing paradigms, including fuzzy logic, neural networks, and genetic algorithms, which can be used to produce powerful hybrid intelligent systems for pattern recognition. Hybrid intelligent systems...
Result Page: Previous 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy