Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
Spread spectrum and CDMA are cutting-edge technologies widely used in operational radar, navigation and telecommunication systems and play a pivotal role in the development of the forthcoming generations of systems and networks.
This comprehensive resource presents the spread spectrum concept as a product of the advancements in wireless IT,...
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
A newly updated and revised edition of the classic introduction to digital image processing
The Fourth Edition of Digital Image Processing provides a complete introduction to the field and includes new information that updates the state of the art. The text offers coverage of new topics and...
Essential reading for IP managers and corporate executives, Innovate or Perish is a new road map equipping readers with the principles and tools needed for their companies to compete in the emerging creativity economy. Edited by Edward Kahn, this seminal book includes contributions from seasoned intellectual property (IP)...
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
FileMaker Pro 8.5 Bible provides step-by-step procedures for using virtually all FileMaker Pro features and performing all tasks. This best-selling volume has been updated to reflect Version 8.5, the latest version of FileMaker Pro workgroup database. Applicable to both the Mac and Windows versions of FileMaker Pro, this...
"I’ve learned more from Deke’s Photoshop Bible than any Photoshop book, ever." -- Scott Kelby, President, National Association of Photoshop Professionals
"When someone asks me something I don’t know about Photoshop, I tell them to go read the Photoshop Bible. It does something no other book does -- it...
Media Resource Control Protocol (MRCP) is a new IETF protocol, providing a key enabling technology that eases the integration of speech technologies into network equipment and accelerates their adoption resulting in exciting and compelling interactive services to be delivered over the telephone. MRCP leverages IP telephony and Web technologies...
Learn how to employ JADE to build multi-agent systems!
JADE (Java Agent DEvelopment framework) is a middleware for the development of applications, both in the mobile and fixed environment, based on the Peer-to-Peer intelligent autonomous agent approach. JADE enables developers to implement and...
A practical guide to building fully operational financial cash flow models for structured finance transactions
Structured finance and securitization deals are becoming more commonplace on Wall Street. Up until now, however, market participants have had to create their own models to analyze these deals, and new entrants have...
Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way...