Home | Amazing | Today | Tags | Publishers | Years | Search 
Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications
The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications

A practical overview of OMA specifications and how they enable mobile multimedia services & much more …!

The Open Mobile Alliance (OMA) is an industry forum, which develops open specifications to help in the creation of applications and services to be deployed over converged networks. The alliance is...

Mobile WiMAX (Wiley - IEE)
Mobile WiMAX (Wiley - IEE)

With the wide and rapid deployment of wireless LANs technology, WiMAX is an emerging technology in wireless communication and is one of the hottest subjects in wireless communications.

Mobile WiMAX is based on selected papers and plenary speeches from the 2007 IEEE Mobile WiMAX Symposium, this book provides...

Fuzzy Systems Engineering: Toward Human-Centric Computing
Fuzzy Systems Engineering: Toward Human-Centric Computing
A self-contained treatment of fuzzy systems engineering, offering conceptual fundamentals, design methodologies, development guidelines, and carefully selected illustrative material

Forty years have passed since the birth of fuzzy sets, in which time a wealth of theoretical developments, conceptual pursuits, algorithmic...

Symbolic Data Analysis and the SODAS Software
Symbolic Data Analysis and the SODAS Software
Classical statistical techniques are often inadequate when it comes to analysing some of the large and internally variable datasets common today. Symbolic Data Analysis (SDA) has evolved in response to this problem and is a vital tool for summarizing information in such a way that the resulting data is of a manageable size. Symbolic data,...
How to Persuade People Who Don't Want to be Persuaded: Get What You Want-Every Time!
How to Persuade People Who Don't Want to be Persuaded: Get What You Want-Every Time!
If you’re in business, you’re selling something–a product, an opinion, a new way of doing things. The truth is, even if you don’t think of yourself as a pitchman, you might as well be one. This powerful guide to ethical influence shows you how to use effective persuasion techniques to get what you want the right...
Java in 60 Minutes A Day
Java in 60 Minutes A Day
Get up and running with Java in no time using this innovative virtual classroom approach!

Do you know how to harness the exciting power of object-oriented programming? Focusing on the Java 2 Platform, Standard Edition (J2SE™), this revolutionary book and companion online presentation take you through 19 one-hour lessons that teach you how...

Implementing Email and Security Tokens: Current Standards, Tools, and Practices
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the...

Marketing to the Social Web: How Digital Customer Communities Build Your Business
Marketing to the Social Web: How Digital Customer Communities Build Your Business
Praise for Marketing to the Social Web

"Weber understands that the world is going digital and that competitive advantage will accrue to those who understand the transformation. CEOs should heed this transformation and learn from Weber's insights how to navigate this new landscape to fully maximize their business opportunities."
...

Digital Compensation for Analog Front-Ends: A New Approach to Wireless Transceiver Design
Digital Compensation for Analog Front-Ends: A New Approach to Wireless Transceiver Design
The desire to build lower cost analog front-ends has triggered interest in a new domain of research. Consequently the joint design of the analog front-end and of the digital baseband algorithms has become an important field of research. It enables the wireless systems and chip designers to more effectively trade the communication performance with...
Digital Television: Technology and Standards
Digital Television: Technology and Standards
The only single, comprehensive textbook on all aspects of digital television

The next few years will see a major revolution in the technology used to deliver television services as the world moves from analog to digital television. Presently, all existing textbooks dealing with analog television standards (NTSC and PAL) are becoming obsolete as...

Result Page: 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy