 |
|
 |  |  Voice and Audio Compression for Wireless Communications"I recommend this book as a useful reference on voice and audio compression for wireless communication." (Computing Reviews, June 10, 2008)
Voice communications remains the most important facet of mobile radio services, which may be delivered over conventional fixed links, the Internet or wireless channels. This... |  |  Designing Effective Web SurveysDesigning Effective Web Surveys is a practical guide to designing Web surveys, based on empirical evidence and grounded in scientific research and theory. It is designed to guide survey practitioners in the art and science of developing and deploying successful Web surveys. It is not intended as a "cook book"; rather it is meant to get... |
|
 Practical Cryptology and Web SecuritySecurity is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web. ... |  |  Security Software Development: Assessing and Managing Security RisksExamining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development... |  |  Macs Portable GeniusSome less-than-charitable folks insist on calling Mac users a “cult.” Why? Well, who knows, really? Perhaps it’s because people who use a Mac actually enjoy using a computer, as opposed to folks using other systems who seem to wage a daily war to stop themselves from putting a fist through their screens. Perhaps it’s because... |
|
|
|
Result Page: 1127 1126 1125 1124 1123 1122 1121 1120 1119 1118 1117 1116 1115 1114 1113 1112 1111 1110 1109 |