Home | Amazing | Today | Tags | Publishers | Years | Search 
Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control
Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control

Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, including both piconets and scatternets, conducted since 2001. The book provides insights into the performance of Bluetooth networks through an analytical approach based upon...

A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....

The Ethical Hack: A Framework for Business Value Penetration Testing
The Ethical Hack: A Framework for Business Value Penetration Testing

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required...

Oracle Internals: Tips, Tricks, and Techniques for DBAs
Oracle Internals: Tips, Tricks, and Techniques for DBAs

If you are a typical Oracle professional, you don't have the luxury of time to keep up with new technology and read all the new manuals to understand each new feature of each release of Oracle. You need a comprehensive source of information and techniques for using the new technology. You need Oracle Internals: Tips, Tricks, and...

Information Security Management Handbook, Fifth Edition
Information Security Management Handbook, Fifth Edition

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...

Software Engineering Measurement
Software Engineering Measurement

The product of many years of practical experience and research in the software measurement business, Software Engineering Measurement lays the basis for measurement standards so that software engineers and system developers can begin to share experimental results in a more meaningful way. This technical reference helps you select what...

Investigator's Guide to Steganography
Investigator's Guide to Steganography

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable...

Creating Components
Creating Components
This text describes how concurrency works, how to more effectively deploy it in program components, and how to reuse these components to improve program design, quality, and performance.

Concurrency is a powerful technique for developing efficient and lightning- fast software. For instance, concurrency can be used in common applications...

The ABCs of LDAP
The ABCs of LDAP
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.

With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...

Wireless Sensor Networks: Architectures and Protocols
Wireless Sensor Networks: Architectures and Protocols

This book describes how to build wireless sensor networks, from the layers of communication protocols through the design of network nodes. It summarizes the multiple applications of wireless sensor networks, then discusses network device design and the requirements that foster the successful performance of these applications. The book discusses...

Defining and Deploying Software Processes
Defining and Deploying Software Processes
I gravitated into the process world several years ago after performing
almost all roles in the software engineering environment — both as a
programmer and in various management positions. That environment
covered both the commercial software development world and the government
contracting software development world. I
...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy