|
|
|
Privacy Protection and Computer Forensics, Second EditionThis book deals with security from hostile computer forensics (mostly on one’s computer, but also on one’s digital camera, fax machine, and related computer-like electronics), as distinct from network forensics, which in this context is snooping into users’ online activities. Computer forensics deals with... | | An Introduction to Microelectromechanical Systems Engineering, Second Edition
The past few years have witnessed an increasing maturity of the MEMS industry and a rapid introduction of new products addressing applications ranging from biochemical analysis to fiber-optic telecommunications. The market size for MEMS products has doubled in the past 5 years and is projected to grow at this fast rate for the foreseeable... | | Mission-Critical Network PlanningI wrote this book in the aftermath of the terrorist attacks that took place on September 11, 2001. Until then, I was planning to write this book at a much later time. But the events of that day compelled me to immediately begin this work. As we have seen, those events have had far-reaching repercussions in the information... |
|
Radar System Performance Modeling, Second EditionThis book addresses the needs of system analysts for radar models and analysis tools. It describes the basic principles of radar operation, how radar is configured and used in military and civilian systems, and how to analyze and model radar at the system level. The book presents and explains equations, computational methods, ... | | The Great Telecom MeltdownThe economic boom of the late 1990s included huge investments in the telecommunications industry and related sectors. It was followed by a downturn of unusual severity, which reduced total paper wealth by trillions of dollars, cost many thousands of jobs, and saw some of the biggest bankruptcies in history. While there certainly... | | |
|
Agile Software Development: Evaluating The Methods For Your OrganizationAre you interested in using an Agile method for developing software? Or are others lobbying you to approve the use of one? Or is your interest more casual; perhaps you are merely wondering if an Agile method is worth considering? Whichever is the case, this book is for you.
I come from the “disciplined process”... | | Practical Software Process ImprovementBased on two of the most widely recognized software development models, CMM (capability maturity model)/CMMI (capability maturity model Integration), this unique new resource offers professionals practical how to guidance on software process improvement. The book provides clear implementation steps that are designed to have a highly positive impact... | | Voice over 802.11 (Artech House Telecommunications Library)An understanding of the public switched telephone network (PSTN) and how it is potentially going to be replaced is best grasped by understanding its three major components: access, switching, and transport. Access pertains to how a user accesses the network. Switching refers to how a call is “switched” or routed ... |
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |