|
|
|
|
|
Privacy Protection and Computer Forensics, Second EditionThis book deals with security from hostile computer forensics (mostly on one’s computer, but also on one’s digital camera, fax machine, and related computer-like electronics), as distinct from network forensics, which in this context is snooping into users’ online activities. Computer forensics deals with... | | An Introduction to Microelectromechanical Systems Engineering, Second Edition
The past few years have witnessed an increasing maturity of the MEMS industry and a rapid introduction of new products addressing applications ranging from biochemical analysis to fiber-optic telecommunications. The market size for MEMS products has doubled in the past 5 years and is projected to grow at this fast rate for the foreseeable... | | Mission-Critical Network PlanningI wrote this book in the aftermath of the terrorist attacks that took place on September 11, 2001. Until then, I was planning to write this book at a much later time. But the events of that day compelled me to immediately begin this work. As we have seen, those events have had far-reaching repercussions in the information... |
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 |