Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless and Mobile Networks Security
Wireless and Mobile Networks Security

This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This...

Object-Oriented Programming in ColdFusion
Object-Oriented Programming in ColdFusion

This book is a fast-paced tutorial to developing ColdFusion applications using an object-oriented programming approach. Complete with code examples that can be altered and applied to your application and careful explanations, this book will guide you through your first interaction with object-oriented programming within your ColdFusion...

Web 2.0 Solutions with Oracle WebCenter 11g
Web 2.0 Solutions with Oracle WebCenter 11g

Oracle WebCenter Suite is the industry's most comprehensive enterprise portal platform designed for business users, unified with business applications, Enterprise 2.0 services, and social communities. It incorporates Web 2.0 content, collaboration, and communication services. However, without proper guidance on developing...

Adaptive High-Resolution Sensor Waveform Design for Tracking
Adaptive High-Resolution Sensor Waveform Design for Tracking

Recent innovations in modern radar for designing transmitted waveforms, coupled with new algorithms for adaptively selecting the waveform parameters at each time step, have resulted in improvements in tracking performance. Of particular interest are waveforms that can be mathematically designed to have reduced ambiguity function sidelobes, as...

A Blogger's Manifesto: Free Speech and Censorship in the Age of the Internet
A Blogger's Manifesto: Free Speech and Censorship in the Age of the Internet

There was never such a thing as true freedom of speech. In order to speak freely you had to have access to a printing press, a newspaper, a radio or a TV station. And everywhere you had to get past the editors. Only an elite ever did - the articulate and well-behaved representatives of ordinary people. But those ordinary people hardly, if...

SAS/STAT 9.22 User's Guide:: The PHREG Procedure (Book Excerpt)
SAS/STAT 9.22 User's Guide:: The PHREG Procedure (Book Excerpt)

The PHREG procedure performs regression analysis of survival data based on the Cox proportional hazards model and its extensions.

The analysis of survival data requires special techniques because the data are almost always incomplete and familiar parametric assumptions might be unjustifiable. Investigators follow subjects until...

Breakthrough Discoveries in Information Technology Research: Advancing Trends
Breakthrough Discoveries in Information Technology Research: Advancing Trends

This collection, entitled Breakthrough Discoveries in Information Technology Research: Advancing Trends , aims to inform researchers and practitioners of novel and emerging research in information science and technology, allowing for the discussion and dissemination of critical concepts that will promote further study and innovation....

Managing Strategic Intelligence: Techniques and Technologies (Premier Reference)
Managing Strategic Intelligence: Techniques and Technologies (Premier Reference)

Environments needing information technology and management skills combined often find that strategic information and intelligence is not always readily available. How to scan management environments for relevant information and then make sense of the information remains a challenge. Managing Strategic Intelligence: Techniques and Technologies...

Eloquent JavaScript: A Modern Introduction to Programming
Eloquent JavaScript: A Modern Introduction to Programming

JavaScript is the language of the Web, and it's at the heart of every modern website from the lowliest personal blog to the mighty Google Apps. Though it's simple for beginners to pick up and play with, JavaScript is not a toy—it's a flexible and complex language, capable of much more than the showy tricks most...

The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

OpenBSD's stateful packet filter, PF, is the heart of the OpenBSD firewall and a necessity for any admin working in a BSD environment. With a little effort and this book, you'll gain the insight needed to unlock PF's full potential.

This second edition of The Book of PF has been completely updated and...

Practical Studies in E-Government: Best Practices from Around the World
Practical Studies in E-Government: Best Practices from Around the World

Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights...

MCTS Self-Paced Training Kit (Exam 70-662): Configuring Microsoft Exchange Server 2010 (Pro - Certification)
MCTS Self-Paced Training Kit (Exam 70-662): Configuring Microsoft Exchange Server 2010 (Pro - Certification)

Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on 70-662, the required exam for the new MCTS: Microsoft ® Exchange Server 2010, Configuring certification. This 2-in-1 kit includes the official Microsoft® study guide, plus practice tests on CD to help you assess your skills. It comes...

Result Page: 1745 1744 1743 1742 1741 1740 1739 1738 1737 1736 1735 1734 1733 1732 1731 1730 1729 1728 1727 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy