Home | Amazing | Today | Tags | Publishers | Years | Search 
Spatial Databases: With Application to GIS (The Morgan Kaufmann Series in Data Management Systems)
Spatial Databases: With Application to GIS (The Morgan Kaufmann Series in Data Management Systems)

"Spatial Databases covers all of the major themes of the field -- representation, query languages, computational geometry, spatial indexing -- using geographic information systems as the principal application domain and motivation. It is an excellent introduction for computer science professionals interested in exploring GIS, and an...

Global Distributed Applications With Windows DNA (Artech House Computing Library)
Global Distributed Applications With Windows DNA (Artech House Computing Library)
Provides a full description of the Microsoft Windows Distributed Internet Applications Architecture (DNA), its purpose, and its proper use for Internet applications development. DLC: Microsoft Windows (Computer file).

Welcome to Global Distributed Applications With Windows DNA. You have probably made a number of assumptions simply by
...
OFDM Towards Fixed and Mobile Broadband Wireless Access
OFDM Towards Fixed and Mobile Broadband Wireless Access
Presenting the state of the art in broadband wireless access technology, this unique resource methodically presents the fundamentals of OFDM(A) technology--the cornerstone of the next generation of broadband wireless access offerings. In addition, this book succinctly depicts the future landscape of mobile broadband wireless access and the...
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role-based access control (RBAC) promises to provide several benefits to organizations. These benefits include simplified security provisioning and administration, ease of reporting on privileges and to whom they are available, and finer grained security authorization. By being policy-neutral, RBAC can be used to enforce the variety of access...
Computer Architecture Techniques for Power-Efficiency (Synthesis Lectures on Computer Architecture)
Computer Architecture Techniques for Power-Efficiency (Synthesis Lectures on Computer Architecture)
In the last few years, power dissipation has become an important design constraint, on par with performance, in the design of new computer systems. Whereas in the past, the primary job of the computer architect was to translate improvements in operating frequency and transistor count into performance, now power efficiency must be taken into account...
Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)
Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)
Probability theory has been the only well-founded theory of uncertainty for a long time. It was viewed either as a powerful tool for modelling random phenomena, or as a rational approach to the notion of degree of belief. During the last thirty years, in areas centered around decision theory, artificial intelligence and information processing,...
Biological Database Modeling
Biological Database Modeling
Modern biological research in areas like drug discovery produces a staggering volume of data, and the right modeling tools can help scientists apply it in ways never before imaginable. This collection of next-generation biodata modeling techniques combines innovative concepts, methods, and applications with case studies in genome, microarray,...
QuickTime Toolkit Volume One: Basic Movie Playback and Media Types (QuickTime Developer Series)
QuickTime Toolkit Volume One: Basic Movie Playback and Media Types (QuickTime Developer Series)
"When QuickTime application developers get stuck, one of the first places they look for help is example code from the QuickTime Engineering team. Finally, these well-crafted examples and clear descriptions are available in book form-a must-have for anyone writing applications that import, export, display, or interact with QuickTime...
Research-Based Web Design & Usability Guidelines
Research-Based Web Design & Usability Guidelines
U.S. Department of Health and Human Services’ (HHS) Research-Based Web Design and Usability Guidelines. These Guidelines reflect HHS’ commitment to identifying innovative, research-based approaches that result in highly responsive and easy-to-use Web sites for the public.

The Federal government is the largest single producer,
...
Result Page: 1068 1067 1066 1065 1064 1063 1062 1061 1060 1059 1058 1057 1056 1055 1054 1053 1052 1051 1050 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy