 |
|
 |  |  |  |  OFDM Towards Fixed and Mobile Broadband Wireless AccessPresenting the state of the art in broadband wireless access technology, this unique resource methodically presents the fundamentals of OFDM(A) technology--the cornerstone of the next generation of broadband wireless access offerings. In addition, this book succinctly depicts the future landscape of mobile broadband wireless access and the... |
|
 Role-Based Access Control, Second EditionRole-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners... |  |  |  |  Network Security Evaluation: Using the NSA IEMAre you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop... |
|
 |  |  |  |  Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)Probability theory has been the only well-founded theory of uncertainty for a long time. It was viewed either as a powerful tool for modelling random phenomena, or as a rational approach to the notion of degree of belief. During the last thirty years, in areas centered around decision theory, artificial intelligence and information processing,... |
|
 Biological Database ModelingModern biological research in areas like drug discovery produces a staggering volume of data, and the right modeling tools can help scientists apply it in ways never before imaginable. This collection of next-generation biodata modeling techniques combines innovative concepts, methods, and applications with case studies in genome, microarray,... |  |  |  |  Research-Based Web Design & Usability GuidelinesU.S. Department of Health and Human Services’ (HHS) Research-Based Web Design and Usability Guidelines. These Guidelines reflect HHS’ commitment to identifying innovative, research-based approaches that result in highly responsive and easy-to-use Web sites for the public.
The Federal government is the largest single producer,... |
|
Result Page: 1068 1067 1066 1065 1064 1063 1062 1061 1060 1059 1058 1057 1056 1055 1054 1053 1052 1051 1050 |