eBooks-share Networking Latest eBooks https://www.books-share.com/rss/computers/networking Latest Networking eBooks from Books-share.com en-us admin@books-share.com admin@books-share.com Mon, 25 May 2020 08:06:05 GMT Books-share.com https://www.books-share.com/images/logo.png https://www.books-share.com/ 158 57 The Knowledge Medium: Designing Effective Computer-Based Educational Learning Environments (by Gary A. Berg) https://www.books-share.com/ebook/the-knowledge-medium-designing-effective-computer-based-educational-learning-environments
Author(s): Gary A. Berg
Categories: Business & Economics > Careers, Business & Economics > Reference, Computers > Networking, Education > General, Computers > Development
Publisher: IGI Global
Publish date: 2002-07-01
ISBN-10: 1591401038
ISBN-13: 9781591401032
Language: English
Description: An examination of the notion of computer as medium and what such an idea might mean for education. It suggests that the understanding of computers as a medium may be a key to re-envisioning educational technology, and draws on a broad range of disciplines, from psychology to film criticism.
]]>
Mon, 25 May 2020 08:06:05 GMT
OpenStack Trove (by Amrith Kumar, Douglas Shelley) https://www.books-share.com/ebook/openstack-trove
Author(s): Amrith Kumar, Douglas Shelley
Categories: Computers > Database Management, Computers > Networking
Publisher: Apress
Publish date: 2015-07-29
ISBN-10: 1484212223
ISBN-13: 9781484212226
Language: English
Description: OpenStack Trove is your step-by-step guide to set up and run a secure and scalable cloud Database as a Service (DBaaS) solution. The book shows you how to set up and configure the Trove DBaaS framework, use prepackaged or custom database implementations, and provision and operate a variety of databases—including MySQL, PostgreSQL, MongoDB, Cassandra, and Redis—in development and production environments. Authors Amrith Kumar and Douglas Shelley, both active technical contributors to the Trove project, describe common deployment scenarios such as single-node database instances and walk you through the setup,... more...
]]>
Mon, 25 May 2020 03:42:03 GMT
Develop on Yammer: Social Integration for Modern Business Applications (by Pathik Rawal, Pryank Rohilla) https://www.books-share.com/ebook/develop-on-yammer-social-integration-for-modern-business-applications
Author(s): Pathik Rawal, Pryank Rohilla
Categories: Computers > Computer Science, Computers > Networking, Computers > Programming Languages, Reference > General
Publisher: Apress
Publish date: 2015-09-09
ISBN-10: 1484209443
ISBN-13: 9781484209448
Language: English
Description: Develop on Yammer is your guide to integrating the Yammer social network with your company’s application ecosystem. By developing custom apps and features on the Yammer platform, you can make your workplace more productive, encourage communication and feedback, and get your colleagues collaborating across a range of platforms, including SharePoint, ASP.NET, and Windows Phone. The book begins with an introduction to the development options available along with guidance on how to set up a Yammer developer account. You’ll then take your first step in Yammer integration by building a Yammer feed into a web page or other... more...
]]>
Mon, 25 May 2020 03:22:02 GMT
Networking Essentials: A CompTIA Network+ N10-006 Textbook (4th Edition) (by Jeffrey S. Beasley, Piyasat Nilkaew) https://www.books-share.com/ebook/networking-essentials-a-comptia-network-n10-006-textbook-4th-edition
Author(s): Jeffrey S. Beasley, Piyasat Nilkaew
Categories: Computers > Certification Guides, Computers > Networking
Publisher: Pearson IT Certification
Publish date: 2016-01-17
ISBN-10: 0789758199
ISBN-13: 9780789758194
Language: English
Description: Thoroughly updated to reflect the CompTIA Network+ N10-006 exam, Networking Essentials, Fourth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management.   Networking Essentials, Fourth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet and TCP/IP networks; routing protocols and router configuration; local, campus, and wide area network configuration; network security;... more...
]]>
Fri, 22 May 2020 14:26:05 GMT
Research in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings (Lecture Notes in Computer Science) (by Joaquin Garcia-Alfaro, Fabian Monrose, Marc Dacier, Gregory Blanc) https://www.books-share.com/ebook/research-in-attacks-intrusions-and-defenses-19th-international-symposium-raid-2016-paris-france-september-19-21-2016-proceedings-lecture-notes-in
Author(s): Joaquin Garcia-Alfaro, Fabian Monrose, Marc Dacier, Gregory Blanc
Categories: Business & Economics > Information Management, Computers > Hardware, Computers > Networking, Computers > Programming, Computers > Development
Publisher: Springer
Publish date: 2016-09-07
ISBN-10: 3319457187
ISBN-13: 9783319457185
Language: English
Description: This book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016. The 21 full papers presented were carefully reviewed and selected from 85 submissions. They are organized around the following topics: systems security; low-level attacks and defenses; measurement studies; malware analysis; network security; systematization of knowledge and experience reports; Web and mobile security.
]]>
Fri, 22 May 2020 04:22:12 GMT
Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy (New Security Challenges) (by George Christou) https://www.books-share.com/ebook/cybersecurity-in-the-european-union-resilience-and-adaptability-in-governance-policy-new-security-challenges
Author(s): George Christou
Categories: Computers > Computer Science, Computers > Networking, Political Science > International Relations, Science > General, Social Science > Criminology
Publisher: Palgrave Macmillan
Publish date: 2015-11-25
ISBN-10: 113740051X
ISBN-13: 9781137400512
Language: English
Description: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
]]>
Thu, 21 May 2020 06:46:06 GMT
Database Systems: A Practical Approach to Design, Implementation and Management (4th Edition) (by Thomas M. Connolly, Carolyn E. Begg) https://www.books-share.com/ebook/database-systems-a-practical-approach-to-design-implementation-and-management-4th-edition
Author(s): Thomas M. Connolly, Carolyn E. Begg
Categories: Computers > Database Management, Computers > Networking, Computers > Programming, Education > General, Computers > Software
Publisher: Addison Wesley
Publish date: 2004-05-27
ISBN-10: 0321210255
ISBN-13: 9780321210258
Language: English
Description: This book places a strong emphasis on good design practice, allowing readers to master design methodology in an accessible, step-by-step fashion. In this book, database design methodology is explicitly divided into three phases: conceptual, logical, and physical. Each phase is described in a separate chapter with an example of the methodology working in practice. Extensive treatment of the Web as an emerging platform for database applications is covered alongside many code samples for accessing databases from the Web including JDBC, SQLJ, ASP, ISP, and Oracle's PSP. A thorough update of later chapters covering object-oriented databases, Web... more...
]]>
Wed, 20 May 2020 18:44:21 GMT
BlackBerry Development Fundamentals (by John M. Wargo) https://www.books-share.com/ebook/blackberry-development-fundamentals
Author(s): John M. Wargo
Categories: Computers > Computer Science, Computers > Hardware, Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Addison-Wesley Professional
Publish date: 2009-11-15
ISBN-10: 0321647424
ISBN-13: 9780321647429
Language: English
Description: The BlackBerry smartphone is today’s #1 mobile platform for the enterprise and also a huge hit with consumers. Until now, it’s been difficult for programmers to find everything they need to begin developing new applications for BlackBerry devices. BlackBerry Development Fundamentals is the solution: the first single-source guide to all aspects of development for the BlackBerry platform.   This book thoroughly reviews the BlackBerry’s unique capabilities and limitations, helps you optimize your upfront design choices, and covers native rich-client applications and Web-based mobile applications for both business and consumer environments. In... more...
]]>
Wed, 20 May 2020 18:42:14 GMT
Android Wireless Application Development Volume II: Advanced Topics (3rd Edition) (Developer's Library) (by Shane Conder, Lauren Darcey) https://www.books-share.com/ebook/android-wireless-application-development-volume-ii-advanced-topics-3rd-edition-developers-library
Author(s): Shane Conder, Lauren Darcey
Categories: Computers > Computer Graphics, Computers > Hardware, Computers > Networking, Computers > Development, Computers > Software Engineering
Publisher: Addison-Wesley Professional
Publish date: 2012-07-24
ISBN-10: 0321813847
ISBN-13: 9780321813848
Language: English
Description: Android Wireless Application Development has earned a reputation as the most useful real-world guide to building robust, commercial-grade Android apps. Now, authors Lauren Darcey and Shane Conder have systematically revised and updated this guide for the latest Android SDK and tools updates. To accommodate their extensive new coverage, they’ve split the book into two leaner, cleaner volumes. This Volume II focuses on advanced techniques for the entire app development cycle, including design, coding, testing, debugging, and distribution. Darcey and Conder cover hot topics ranging from tablet development to protecting against... more...
]]>
Wed, 20 May 2020 18:39:06 GMT
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks (by Quan Z. Sheng, Damith C. Ranasinghe, Sherali Zeadally) https://www.books-share.com/ebook/unique-radio-innovation-for-the-21st-century-building-scalable-and-global-rfid-networks
Author(s): Quan Z. Sheng, Damith C. Ranasinghe, Sherali Zeadally
Categories: Business & Economics > Production & Operations Management, Computers > Hardware, Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Springer
Publish date: 2010-10-11
ISBN-10: 3642034616
ISBN-13: 9783642034619
Language: English
Description: Are you an engineer or a researcher developing RFID systems? Are you a manager considering deploying RFID-based applications? If so, this book is for you. Covering modern RFID systems, the challenges to RFID implementation are addressed using specific industrial research examples and common integration issues. The primary focus is on answering questions surrounding building scalable global Internet-based RFID networks. Key topics include RFID data management, RFID data processing and integration, Real-Time Locating Systems (RTLS) and sensors. The book considers the challenges of and solutions to building and exploiting global networks to guarantee... more...
]]>
Wed, 20 May 2020 10:00:18 GMT
IT Convergence and Security 2017: Volume 1 (Lecture Notes in Electrical Engineering) (by Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek) https://www.books-share.com/ebook/it-convergence-and-security-2017-volume-1-lecture-notes-in-electrical-engineering
Author(s): Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek
Categories: Computers > Artificial Intelligence, Computers > Cryptography, Computers > Networking
Publisher: Springer
Publish date: 2017-10-05
ISBN-10: 9811064504
ISBN-13: 9789811064500
Language: English
Description: This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues are core to most current research, and industrial and commercial activities. It consists of contributions covering topics such as machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful... more...
]]>
Wed, 20 May 2020 09:54:15 GMT
Web Engineering : Managing Diversity and Complexity of Web Application Development (by san (editor) ; deshpande, yogesh (editor) ; murugesan, s. (author) murugesan) https://www.books-share.com/ebook/web-engineering-managing-diversity-and-complexity-of-web-application-development
Author(s): san (editor) ; deshpande, yogesh (editor) ; murugesan, s. (author) murugesan
Categories: Business & Economics > Information Management, Computers > Computer Graphics, Computers > Hardware, Computers > Networking, Computers > Development
Publisher: Springer
Publish date: 2001-06-15
ISBN-10: 3540421300
ISBN-13: 9783540421306
Language: English
Description: This book gives a unique account of the emerging field of Web engineering by presenting 25 thoroughly reviewed papers drawn from two recent workshops on the topic together with introductory and motivating surveys and a list of Web engineering resources in chapters on - Web engineering: introduction and perspectives - Web-based system development: process and methodology - Managing information on the Web - Development tools, skills, and case studies - Performance, testing, and Web metrices - Web maintenance and reuse The book will appeal equally to researchers, students, professionals and practitioners in industry interested in developing,... more...
]]>
Wed, 20 May 2020 09:48:06 GMT
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare (by Joel Brenner) https://www.books-share.com/ebook/america-the-vulnerable-inside-the-new-threat-matrix-of-digital-espionage-crime-and-warfare
Author(s): Joel Brenner
Categories: Computers > Networking, Technology & Engineering > General
Publisher: Penguin Press HC, The
Publish date: 2011-09-29
ISBN-10: 159420313X
ISBN-13: 9781594203138
Language: English
Description: A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals. Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking... more...
]]>
Wed, 20 May 2020 09:40:06 GMT
Advanced Router Architectures (by Axel K. Kloth) https://www.books-share.com/ebook/advanced-router-architectures
Author(s): Axel K. Kloth
Categories: Computers > Networking, Science > Light, Science > Optics
Publisher: CRC Press
Publish date: 2005-11-01
ISBN-10: 0849335507
ISBN-13: 9780849335501
Language: English
Description: Routers, switches, and transmission equipment form the backbone of the Internet, yet many users and service technicians do not understand how these nodes really work. Advanced Router Architectures addresses how components of advanced routers work together and how they are integrated with each other. This book provides the background behind why these building blocks perform certain functions, and how the function is implemented in general use. It offers an introduction to the subject matter that is intended to trigger deeper interest from the reader. The book explains, for example, why traffic management may be important in certain applications,... more...
]]>
Wed, 20 May 2020 09:38:05 GMT
Wireless Sensor Networks: A Cognitive Perspective (Adaptation in Wireless Communications) (by Mohamed Ibnkahla) https://www.books-share.com/ebook/wireless-sensor-networks-a-cognitive-perspective-adaptation-in-wireless-communications
Author(s): Mohamed Ibnkahla
Categories: Computers > Networking
Publisher: CRC Press
Publish date: 2012-09-20
ISBN-10: 1439852774
ISBN-13: 9781439852774
Language: English
Description: With classical techniques for data transmission soon reaching their limitations, cognitive approaches may offer a solution to user requirements for better coverage, connectivity, security, and energy efficiency at lower cost. Wireless Sensor Networks: A Cognitive Perspective presents a unified view of the state of the art of cognitive approaches in telecommunications. A benchmark in the field, it brings together research that has previously been scattered throughout conference and journal papers. Cutting-Edge Topics in Cognitive Communications After a review of the cognitive concept and approaches, the book outlines a... more...
]]>
Wed, 20 May 2020 09:24:07 GMT
Googling Security: How Much Does Google Know About You? (by Greg Conti) https://www.books-share.com/ebook/googling-security-how-much-does-google-know-about-you
Author(s): Greg Conti
Categories: Computers > Certification Guides, Computers > Computer Science, Computers > Networking, Reference > General
Publisher: Addison-Wesley Professional
Publish date: 2008-10-20
ISBN-10: 0321518667
ISBN-13: 9780321518668
Language: English
Description: What Does Google Know about You? And Who Are They Telling?   When you use Google’s “free” services, you pay, big time–with personal information about yourself. Google is making a fortune on what it knows about you…and you may be shocked by just how much Google does know. Googling Security is the first book to reveal how Google’s vast information stockpiles could be used against you or your business–and what you can do to protect yourself.   Unlike other books on Google hacking, this book covers information you disclose when using all of Google’s top applications, not just what savvy users... more...
]]>
Wed, 20 May 2020 07:58:08 GMT
Computing and Network Sustainability: Proceedings of IRSCNS 2016 (Lecture Notes in Networks and Systems) (by H.R . Vishwakarma, Shyam Akashe) https://www.books-share.com/ebook/computing-and-network-sustainability-proceedings-of-irscns-2016-lecture-notes-in-networks-and-systems
Author(s): H.R . Vishwakarma, Shyam Akashe
Categories: Computers > Computer Science, Computers > Cryptography, Computers > Hardware, Computers > Networking
Publisher: Springer
Publish date: 2017-08-03
ISBN-10: 9811039348
ISBN-13: 9789811039348
Language: English
Description: The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st  and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.
]]>
Wed, 20 May 2020 03:30:03 GMT
The Bento Book: Beauty and Simplicity in Digital Organization (by Jesse Feiler) https://www.books-share.com/ebook/the-bento-book-beauty-and-simplicity-in-digital-organization
Author(s): Jesse Feiler
Categories: Computers > Database Management, Computers > Networking, Computers > Software
Publisher: Que
Publish date: 2008-10-18
ISBN-10: 0789738120
ISBN-13: 9780789738127
Language: English
Description: Find everything fast...from iCal, Address Book, Apple Mail, even MobileMe and iPhone        •    Use Bento’s stunning templates and themes      •    Master Smart Collections and other advanced features      •    Keep a nature/garden log      •    Manage projects      •    Create storyboards      •    And more...much more   Bento is the best way to organize your life. Your contacts, events, tasks, projects, stuff, everything. This book makes Bento even better. (And even easier.) Learn how to use everything that’s built into Bento...and extend Bento to do even more. Quick.... more...
]]>
Wed, 20 May 2020 02:54:17 GMT
The Pi-Calculus: A Theory of Mobile Processes (by David Walker, Davide Sangiorgi) https://www.books-share.com/ebook/the-pi-calculus-a-theory-of-mobile-processes
Author(s): David Walker, Davide Sangiorgi
Categories: Computers > Networking, Computers > Programming, Mathematics > General, Reference > General, Computers > Development
Publisher: Cambridge University Press
Publish date: 2001-12-03
ISBN-10: 0521781779
ISBN-13: 9780521781770
Language: English
Description: Mobile systems, whose components communicate and change their structure, now pervade the informational world and the wider world of which it is a part. The science of mobile systems is as yet immature, however. This book presents the pi-calculus, a theory of mobile systems. The pi-calculus provides a conceptual framework for understanding mobility, and mathematical tools for expressing systems and reasoning about their behaviours. The book serves both as a reference for the theory and as an extended demonstration of how to use pi-calculus to describe systems and analyse their properties. It covers the basic theory of pi-calculus, typed pi-calculi,... more...
]]>
Wed, 20 May 2020 02:50:09 GMT
The Digital Signal Processing Handbook (Second Edition) (by VIJAY MADISETTI) https://www.books-share.com/ebook/the-digital-signal-processing-handbook-second-edition
Author(s): VIJAY MADISETTI
Categories: Computers > Certification Guides, Computers > Computer Science, Computers > Networking, Computers > Software Engineering
Publisher: CRC Press
Publish date: 2009-11-20
ISBN-10: 1420046047
ISBN-13: 9781420046045
Language: English
Description: Now available in a three-volume set, this updated and expanded edition of the bestselling The Digital Signal Processing Handbook continues to provide the engineering community with authoritative coverage of the fundamental and specialized aspects of information-bearing signals in digital form. Encompassing essential background material, technical details, standards, and software, the second edition reflects cutting-edge information on signal processing algorithms and protocols related to speech, audio, multimedia, and video processing technology associated with standards ranging from WiMax to MP3 audio,... more...
]]>
Wed, 20 May 2020 01:24:04 GMT
Artificial Intelligence in Wireless Communications (Mobile Communications) (by Thomas W. Rondeau, Charles W. Bostian) https://www.books-share.com/ebook/artificial-intelligence-in-wireless-communications-mobile-communications
Author(s): Thomas W. Rondeau, Charles W. Bostian
Categories: Computers > Artificial Intelligence, Computers > Networking, Computers > Programming, Technology & Engineering > Engineering (General)
Publisher: Artech House Publishers
Publish date: 2009-06-01
ISBN-10: 1607832348
ISBN-13: 9781607832348
Language: English
Description: This cutting-edge resource offers practical overview of cognitive radio - a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment. This book offers a detailed description of cognitive radio and its individual parts. Practitioners learn how the basic processing elements and their capabilities are implemented as modular components. Moreover, the book explains how each component can be developed and tested independently, before integration with the rest... more...
]]>
Wed, 20 May 2020 01:22:11 GMT
CCNP Quick Reference (by Denise Donohue, Brent Stewart, Jerold Swan) https://www.books-share.com/ebook/ccnp-quick-reference
Author(s): Denise Donohue, Brent Stewart, Jerold Swan
Categories: Computers > Certification Guides, Computers > Networking, Study Aids > Study Guides
Publisher: Cisco Press
Publish date: 2008-06-27
ISBN-10: 1587202360
ISBN-13: 9781587202360
Language: English
Description: CCNP Quick ReferenceA quick review of CCNP exam topicsDenise Donohue, CCIE® No. 9566Brent StewartJerold Swan, CCIE No.17783As a final exam preparation tool, the CCNP Quick Reference provides a concise review of all objectives on the four CCNP exams, including BSCI (642-901), BCMSN (642-812), ISCW (642-825) and ONT (642-845). This book provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format. The easy-to-reference format and succinct presentation help you drill on key exam topics.With this document as your guide, you will review topics on routing, switching, secure remote access networks,... more...
]]>
Tue, 19 May 2020 23:56:21 GMT
Machine Learning: Discriminative and Generative (The Springer International Series in Engineering and Computer Science) (by Tony Jebara) https://www.books-share.com/ebook/machine-learning-discriminative-and-generative-the-springer-international-series-in-engineering-and-computer-science
Author(s): Tony Jebara
Categories: Computers > Artificial Intelligence, Computers > Networking, Mathematics > Probability & Statistics, Technology & Engineering > Engineering (General)
Publisher: Springer
Publish date: 2003-12-31
ISBN-10: 1402076479
ISBN-13: 9781402076473
Language: English
Description: Machine Learning: Discriminative and Generative covers the main contemporary themes and tools in machine learning ranging from Bayesian probabilistic models to discriminative support-vector machines. However, unlike previous books that only discuss these rather different approaches in isolation, it bridges the two schools of thought together within a common framework, elegantly connecting their various theories and making one common big-picture. Also, this bridge brings forth new hybrid discriminative-generative tools that combine the strengths of both camps. This book serves multiple purposes as well. The framework acts as a... more...
]]>
Tue, 19 May 2020 23:40:09 GMT
Elements of Distributed Algorithms: Modeling and Analysis with Petri Nets (by Wolfgang Reisig) https://www.books-share.com/ebook/elements-of-distributed-algorithms-modeling-and-analysis-with-petri-nets
Author(s): Wolfgang Reisig
Categories: Computers > Networking, Computers > Programming, Mathematics > General, Computers > Development, Computers > Software Engineering
Publisher: Springer
Publish date: 2001-09-18
ISBN-10: 3540627529
ISBN-13: 9783540627524
Language: English
Description: Distributed Computing is rapidly becoming the principal computing paradigm in diverse areas of computing, communication, and control. Processor clusters, local and wide area networks, and the information highway evolved a new kind of problems which can be solved with distributed algorithms. In this textbook a variety of distributed algorithms are presented independently of particular programming languages or hardware, using the graphically suggestive technique of Petri nets which is both easy to comprehend intuitively and formally rigorous. By means of temporal logic the author provides surprisingly simple yet powerful correctness proofs for the... more...
]]>
Tue, 19 May 2020 23:24:19 GMT
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems) (by Mohamed Boucadair) https://www.books-share.com/ebook/inter-asterisk-exchange-iax-deployment-scenarios-in-sip-enabled-networks-wiley-series-on-communications-networking-and-distributed-systems
Author(s): Mohamed Boucadair
Categories: Computers > Certification Guides, Computers > Computer Science, Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Wiley
Publish date: 2009-02-24
ISBN-10: 0470770724
ISBN-13: 9780470770726
Language: English
Description: Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal, security, IPv6 support, interworking between IPv4 and IPv6, interworking with SIP and many others. The author presents the ways in which IAX can be activated so as to avoid complications such as NAT and the presence of intermediary boxes in operational architectures. This book analytically demonstrates the... more...
]]>
Tue, 19 May 2020 21:56:05 GMT
Send: Why People Email So Badly and How to Do It Better, Revised Edition (by Will Schwalbe, David Shipley) https://www.books-share.com/ebook/send-why-people-email-so-badly-and-how-to-do-it-better-revised-edition
Author(s): Will Schwalbe, David Shipley
Categories: Business & Economics > Skills, Computers > Networking, Reference > General
Publisher: Knopf
Publish date: 2008-09-02
ISBN-10: 0307270602
ISBN-13: 9780307270603
Language: English
Description: No description available
]]>
Tue, 19 May 2020 21:54:05 GMT
Information Retrieval: Searching in the 21st Century (by Ayse Goker, John Davies) https://www.books-share.com/ebook/information-retrieval-searching-in-the-21st-century
Author(s): Ayse Goker, John Davies
Categories: Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Wiley
Publish date: 2009-12-08
ISBN-10: 0470027622
ISBN-13: 9780470027622
Language: English
Description: This book is an essential reference to cutting-edge issues and future directions in information retrievalInformation retrieval (IR) can be defined as the process of representing, managing, searching, retrieving, and presenting information. Good IR involves understanding information needs and interests, developing an effective search technique, system, presentation, distribution and delivery. The increased use of the Web and wider availability of information in this environment led to the development of Web search engines. This change has brought fresh challenges to a wider variety of users’ needs, tasks, and types of information.Today, search... more...
]]>
Tue, 19 May 2020 21:50:16 GMT
IP for 4G (by David Wisely) https://www.books-share.com/ebook/ip-for-4g
Author(s): David Wisely
Categories: Computers > Networking
Publisher: Wiley
Publish date: 2009-02-24
ISBN-10: 0470510161
ISBN-13: 9780470510162
Language: English
Description: Excellent reference with expert insight into the future evolution of mobile communications: 4G IP for 4G examines the concept of 4G, providing an in-depth background to the key technologies and developments shaping the new generation of mobile services, including Wireless Local Area Networks (WLANs), Worldwide Interoperability for Microwave Access (WiMAX), IP developments (SIP and Media Independent Handover), Internet Multimedia Subsystem (IMS), and 3G (HSDPA and LTE). The book addresses these key technological drivers in light of commercial propositions such as generating extra revenue and reducing costs, and offers an... more...
]]>
Tue, 19 May 2020 21:42:08 GMT
Cloud Computing (The MIT Press Essential Knowledge series) (by Nayan B. Ruparelia) https://www.books-share.com/ebook/cloud-computing-the-mit-press-essential-knowledge-series
Author(s): Nayan B. Ruparelia
Categories: Computers > Networking
Publisher: The MIT Press
Publish date: 2016-05-13
ISBN-10: 0262529092
ISBN-13: 9780262529099
Language: English
Description: Most of the information available on cloud computing is either highly technical, with details that are irrelevant to non-technologists, or pure marketing hype, in which the cloud is simply a selling point. This book, however, explains the cloud from the user's viewpoint -- the business user's in particular. Nayan Ruparelia explains what the cloud is, when to use it (and when not to), how to select a cloud service, how to integrate it with other technologies, and what the best practices are for using cloud computing. Cutting through the hype, Ruparelia cites the simple and basic definition of cloud computing from the... more...
]]>
Tue, 19 May 2020 21:18:20 GMT
High Performance Heterogeneous Computing (Wiley Series on Parallel and Distributed Computing) (by Jack Dongarra, Alexey L. Lastovetsky) https://www.books-share.com/ebook/high-performance-heterogeneous-computing-wiley-series-on-parallel-and-distributed-computing
Author(s): Jack Dongarra, Alexey L. Lastovetsky
Categories: Computers > Networking
Publisher: Wiley-Interscience
Publish date: 2009-08-03
ISBN-10: 0470040394
ISBN-13: 9780470040393
Language: English
Description: An analytical overview of the state of the art, open problems, and future trends in heterogeneous parallel and distributed computing This book provides an overview of the ongoing academic research, development, and uses of heterogeneous parallel and distributed computing in the context of scientific computing. Presenting the state of the art in this challenging and rapidly evolving area, the book is organized in five distinct parts: Heterogeneous Platforms: Taxonomy, Typical Uses, and Programming Issues Performance Models of Heterogeneous Platforms and Design of¿Heterogeneous Algorithms... more...
]]>
Tue, 19 May 2020 19:54:13 GMT
Frequency Assignment and Network Planning for Digital Terrestrial Broadcasting Systems (ERCOFTAC Series) (by Roland Beutler) https://www.books-share.com/ebook/frequency-assignment-and-network-planning-for-digital-terrestrial-broadcasting-systems-ercoftac-series
Author(s): Roland Beutler
Categories: Computers > Hardware, Computers > Networking, Mathematics > General, Technology & Engineering > Engineering (General)
Publisher: Springer
Publish date: 2004-05-31
ISBN-10: 1402078722
ISBN-13: 9781402078729
Language: English
Description: Frequency Assignment and Network Planning for Digital Terrestrial Broadcasting Systems focuses on Digital Audio Broadcasting and Digital Video Broadcasting. The author provides a concise introduction to the subject and presents principles, concepts and commonly accepted methods used in the planning process. The frequency assignment material focuses on allotment planning while network planning is dealt with mainly from a network optimization perspective. All methods introduced and mathematical tools presented are fully explained. General concepts are illustrated with the help of several planning scenarios both for frequency assignment and network... more...
]]>
Tue, 19 May 2020 19:00:18 GMT
Fraud Prevention in Online Digital Advertising (SpringerBriefs in Computer Science) (by Xingquan Zhu, Zhiang Wu, Haicheng Tao, Jie Cao, Kristopher Kalish, Jeremy Kayne) https://www.books-share.com/ebook/fraud-prevention-in-online-digital-advertising-springerbriefs-in-computer-science
Author(s): Xingquan Zhu, Zhiang Wu, Haicheng Tao, Jie Cao, Kristopher Kalish, Jeremy Kayne
Categories: Computers > Computer Science, Computers > Cryptography, Computers > Hardware, Computers > Networking
Publisher: Springer
Publish date: 2017-06-17
ISBN-10: 3319567926
ISBN-13: 9783319567921
Language: English
Description: The authors systematically review methods of online digital advertising (ad) fraud and the techniques to prevent and defeat such fraud in this brief. The authors categorize ad fraud into three major categories, including (1) placement fraud, (2) traffic fraud, and (3) action fraud. It summarizes major features of each type of fraud, and also outlines measures and resources to detect each type of fraud. This brief provides a comprehensive guideline to help researchers understand the state-of-the-art in ad fraud detection. It also serves as a technical reference for industry to design new techniques and solutions to win the... more...
]]>
Tue, 19 May 2020 18:20:10 GMT
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center (by Marshall Copeland) https://www.books-share.com/ebook/cyber-security-on-azure-an-it-professional-s-guide-to-microsoft-azure-security-center
Author(s): Marshall Copeland
Categories: Computers > Computer Science, Computers > Cryptography, Computers > Networking, Computers > Development
Publisher: Apress
Publish date: 2017-08-19
ISBN-10: 1484227395
ISBN-13: 9781484227398
Language: English
Description: Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database... more...
]]>
Tue, 19 May 2020 17:30:07 GMT
Getting Started with FortiGate (by Fabrizio Volpe, Rosato Fabbri) https://www.books-share.com/ebook/getting-started-with-fortigate
Author(s): Fabrizio Volpe, Rosato Fabbri
Categories: Computers > Networking
Publisher: Packt Publishing
Publish date: 2013-11-25
ISBN-10: 1782178201
ISBN-13: 9781782178200
Language: English
Description: Simplify and protect your network using the FortiGate network security appliance Overview Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of Fortinet products Understand and deliver Routing, VLANs, NAT, and high availability solutions using FortiGate units Design and deploy security policies, content filters, and endpoint security using UTM features inside a FortiGate unit In Detail FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL,... more...
]]>
Tue, 19 May 2020 17:08:05 GMT
Database Design: Know It All (Morgan Kaufmann Know It All) (by Jan L. Harrington, Sam S. Lightstone, Toby J. Teorey, Jim Melton, William H. Inmon, Bonnie O'Neil, Lowell Fryman, Terry Halpin, Ralf Hartmut Güting, Markus Schneider, Stephen Buxton, Tony Morgan, Thomas P. Nadeau, Elizabeth O'Neil, Patrick O'Neil, Graeme Simsion, Graham Witt) https://www.books-share.com/ebook/database-design-know-it-all-morgan-kaufmann-know-it-all
Author(s): Jan L. Harrington, Sam S. Lightstone, Toby J. Teorey, Jim Melton, William H. Inmon, Bonnie O'Neil, Lowell Fryman, Terry Halpin, Ralf Hartmut Güting, Markus Schneider, Stephen Buxton, Tony Morgan, Thomas P. Nadeau, Elizabeth O'Neil, Patrick O'Neil, Graeme Simsion, Graham Witt
Categories: Computers > Database Management, Computers > Networking
Publisher: Morgan Kaufmann
Publish date: 2008-11-11
ISBN-10: 0123746302
ISBN-13: 9780123746306
Language: English
Description: This book brings all of the elements of database design together in a single volume, saving the reader the time and expense of making multiple purchases. It consolidates both introductory and advanced topics, thereby covering the gamut of database design methodology ? from ER and UML techniques, to conceptual data modeling and table transformation, to storing XML and querying moving objects databases. The proposed book expertly combines the finest database design material from the Morgan Kaufmann portfolio. Individual chapters are derived from a select group of MK books authored by the best and brightest in the field. These chapters are combined... more...
]]>
Tue, 19 May 2020 16:26:07 GMT
Android Malware (SpringerBriefs in Computer Science) (by Xuxian Jiang, Yajin Zhou) https://www.books-share.com/ebook/android-malware-springerbriefs-in-computer-science
Author(s): Xuxian Jiang, Yajin Zhou
Categories: Computers > Hardware, Computers > Internet, Computers > Networking, Computers > Programming
Publisher: Springer
Publish date: 2013-06-27
ISBN-10: 1461473934
ISBN-13: 9781461473930
Language: English
Description: Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns.  Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform.  Covering key topics like the Android malware history, malware behavior and classification,... more...
]]>
Tue, 19 May 2020 15:44:14 GMT
Secondary Liability of Internet Service Providers (Ius Comparatum - Global Studies in Comparative Law) (by Graeme B. Dinwoodie) https://www.books-share.com/ebook/secondary-liability-of-internet-service-providers-ius-comparatum-global-studies-in-comparative-law
Author(s): Graeme B. Dinwoodie
Categories: Computers > Computer Science, Computers > Cryptography, Computers > Networking, Law > International, Philosophy > General
Publisher: Springer
Publish date: 2017-07-27
ISBN-10: 3319550284
ISBN-13: 9783319550282
Language: English
Description: This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers. Many such claims involve intellectual property infringement, but the treatment extends beyond that field of law. Because there are few formal international standards which govern the question of secondary liability, comprehension of the international landscape requires treatment of a broad range of national approaches. This book thus canvasses... more...
]]>
Tue, 19 May 2020 15:12:11 GMT
Social Network Analysis in Predictive Policing: Concepts, Models and Methods (Lecture Notes in Social Networks) (by Uwe Glässer, Mohammad A. Tayebi) https://www.books-share.com/ebook/social-network-analysis-in-predictive-policing-concepts-models-and-methods-lecture-notes-in-social-networks
Author(s): Uwe Glässer, Mohammad A. Tayebi
Categories: Computers > Cryptography, Computers > Database Management, Computers > Networking, Science > System Theory, Social Science > Criminology
Publisher: Springer
Publish date: 2016-11-12
ISBN-10: 3319414917
ISBN-13: 9783319414911
Language: English
Description: This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks―networks of offenders who have committed crimes together―have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather... more...
]]>
Tue, 19 May 2020 14:52:02 GMT
The Complete Book of Middleware (by Judith M. Myerson) https://www.books-share.com/ebook/the-complete-book-of-middleware
Author(s): Judith M. Myerson
Categories: Computers > Computer Science, Computers > Database Management, Computers > Networking, Computers > Development, Computers > Software Engineering
Publisher: Auerbach Publications
Publish date: 2002-03-05
ISBN-10: 0849312728
ISBN-13: 9780849312724
Language: English
Description: The challenges of designing, building, and maintaining large-scale, distributed enterprise systems are truly daunting. Written for all IT professionals, The Complete Book of Middleware will aid in resolving new business objectives, new technologies, and vendor disputes. This book focuses on the essential principles and priorities of system design and emphasizes the new requirements brought forward by the rise of e-commerce and distributed integrated systems. This reference highlights the changes to middleware technologies and standards. It offers a concise overview of middleware technology alternatives and distributed systems. Many increasingly... more...
]]>
Tue, 19 May 2020 14:32:11 GMT
Data Analytics in Digital Humanities (Multimedia Systems and Applications) (by Shalin Hai-Jew) https://www.books-share.com/ebook/data-analytics-in-digital-humanities-multimedia-systems-and-applications
Author(s): Shalin Hai-Jew
Categories: Computers > Artificial Intelligence, Computers > Hardware, Computers > Internet, Computers > Networking
Publisher: Springer
Publish date: 2017-06-06
ISBN-10: 3319544985
ISBN-13: 9783319544984
Language: English
Description: This book covers computationally innovative methods and technologies including data collection and elicitation, data processing, data analysis, data visualizations, and data presentation. It explores how digital humanists have harnessed the hypersociality and social technologies, benefited from the open-source sharing not only of data but of code, and made technological capabilities a critical part of humanities work.  Chapters are written by researchers from around the world, bringing perspectives from diverse fields and subject areas. The respective authors describe their work, their research, and their learning.... more...
]]>
Tue, 19 May 2020 13:20:02 GMT
Public-Key Cryptography - PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, ... Part II (Lecture Notes in Computer Science) (by Serge Fehr) https://www.books-share.com/ebook/public-key-cryptography-pkc-2017-20th-iacr-international-conference-on-practice-and-theory-in-public-key-cryptography-amsterdam-the-netherlands-part-1
Author(s): Serge Fehr
Categories: Business & Economics > Information Management, Computers > Hardware, Computers > Information Theory, Computers > Networking, Computers > Programming
Publisher: Springer
Publish date: 2017-02-26
ISBN-10: 3662543877
ISBN-13: 9783662543870
Language: English
Description: The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols,  Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control,  Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
]]>
Tue, 19 May 2020 12:46:12 GMT
Encrypted Email: The History and Technology of Message Privacy (SpringerBriefs in Computer Science) (by Hilarie Orman) https://www.books-share.com/ebook/encrypted-email-the-history-and-technology-of-message-privacy-springerbriefs-in-computer-science
Author(s): Hilarie Orman
Categories: Computers > Cryptography, Computers > Hardware, Computers > Networking
Publisher: Springer
Publish date: 2015-08-09
ISBN-10: 3319213431
ISBN-13: 9783319213439
Language: English
Description: This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final... more...
]]>
Tue, 19 May 2020 12:42:19 GMT
Mobile Application Security (by Himanshu Dwivedi, David Thiel, Chris Clark) https://www.books-share.com/ebook/mobile-application-security
Author(s): Himanshu Dwivedi, David Thiel, Chris Clark
Categories: Computers > Networking, Computers > Programming
Publisher: McGraw-Hill Osborne Media
Publish date: 2010-01-15
ISBN-10: 0071633561
ISBN-13: 9780071633567
Language: English
Description: Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource. Design highly isolated,... more...
]]>
Tue, 19 May 2020 12:04:09 GMT
Stochastic Network Optimization with Application to Communication and Queueing Systems (Synthesis Lectures on Communication Networks) (by Michael J. Neely) https://www.books-share.com/ebook/stochastic-network-optimization-with-application-to-communication-and-queueing-systems-synthesis-lectures-on-communication-networks
Author(s): Michael J. Neely
Categories: Computers > Networking, Mathematics > General
Publisher: Morgan and Claypool Publishers
Publish date: 2010-09-20
ISBN-10: 160845455X
ISBN-13: 9781608454556
Language: English
Description: This text presents a modern theory of analysis, control, and optimization for dynamic networks. Mathematical techniques of Lyapunov drift and Lyapunov optimization are developed and shown to enable constrained optimization of time averages in general stochastic systems. The focus is on communication and queueing systems, including wireless networks with time-varying channels, mobility, and randomly arriving traffic. A simple drift-plus-penalty framework is used to optimize time averages such as throughput, throughput-utility, power, and distortion. Explicit performance-delay tradeoffs are provided to illustrate the cost of approaching optimality.... more...
]]>
Tue, 19 May 2020 11:44:18 GMT
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (by OccupyTheWeb) https://www.books-share.com/ebook/linux-basics-for-hackers-getting-started-with-networking-scripting-and-security-in-kali
Author(s): OccupyTheWeb
Categories: Computers > Cryptography, Computers > Networking
Publisher: No Starch Press
Publish date: 2018-12-04
ISBN-10: 1593278551
ISBN-13: 9781593278557
Language: English
Description: This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First,... more...
]]>
Tue, 19 May 2020 10:44:57 GMT
Microsoft® Outlook® 2013 Plain & Simple (by Jim Boyce) https://www.books-share.com/ebook/microsoft-outlook-2013-plain-and-simple
Author(s): Jim Boyce
Categories: Computers > Desktop Applications, Computers > Networking, Computers > Operating Systems
Publisher: Microsoft Press
Publish date: 2013-03-26
ISBN-10: 073566935X
ISBN-13: 9780735669352
Language: English
Description: Learn the simplest ways to get things done with Microsoft Outlook 2013 Get the full-color, visual guide that makes learning Microsoft Outlook 2013 plain and simple! Follow the book’s easy steps and screenshots and clear, concise language to learn how to stay productive and keep in touch with all of your personal, business, and social media networks. Here’s WHAT you’ll learn: Format and send messages, files, and photos Set up mobile alerts for important messages Manage your inbox and limit junk mail Update and share your calendar Add social... more...
]]>
Tue, 19 May 2020 10:43:57 GMT
Digital Radio System Design (by Grigorios Kalivas) https://www.books-share.com/ebook/digital-radio-system-design
Author(s): Grigorios Kalivas
Categories: Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Wiley
Publish date: 2010-01-26
ISBN-10: 0470847093
ISBN-13: 9780470847091
Language: English
Description: A systematic explanation of the principles of radio systems, Digital Radio System Design offers a balanced treatment of both digital transceiver modems and RF front-end subsystems and circuits. It provides an in-depth examination of the complete transceiver chain which helps to connect the two topics in a unified system concept. Although the book tackles such diverse fields it treats them in sufficient depth to give the designer a solid foundation and an implementation perspective.Covering the key concepts and factors that characterise and impact radio transmission and reception, the book presents topics such as receiver design, noise and... more...
]]>
Tue, 19 May 2020 08:42:13 GMT
Nanoscale Communication Networks (Nanoscale Science and Engineering) (by Stephen F. Bush) https://www.books-share.com/ebook/nanoscale-communication-networks-nanoscale-science-and-engineering
Author(s): Stephen F. Bush
Categories: Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Artech House
Publish date: 2010-02-28
ISBN-10: 1608070034
ISBN-13: 9781608070039
Language: English
Description: A highly useful resource for professionals and students alike, this cutting-edge, first-of-its-kind book provides a thorough introduction to nanoscale communication networks. Written in a clear tutorial style, this volume covers a wide range of the most important topics in the area, from molecular communication and carbon nanotube nano-networks, to nanoscale quantum networking and the future direction of nano networks. Moreover, the book features numerous exercise problems at the end of each chapter to ensure a solid understanding of the material.
]]>
Tue, 19 May 2020 08:40:21 GMT
MIMO Wireless Communications: From Real-World Propagation to Space-Time Code Design (by Claude Oestges, Bruno Clerckx) https://www.books-share.com/ebook/mimo-wireless-communications-from-real-world-propagation-to-space-time-code-design
Author(s): Claude Oestges, Bruno Clerckx
Categories: Computers > Networking
Publisher: Academic Press
Publish date: 2007-06-04
ISBN-10: 0123725356
ISBN-13: 9780123725356
Language: English
Description: Uniquely, this book proposes robust space-time code designs for real-world wireless channels. Through a unified framework, it emphasizes how propagation mechanisms such as space-time frequency correlations and coherent components impact the MIMO system performance under realistic power constraints. Combining a solid mathematical analysis with a physical and intuitive approach to space-time coding, the book progressively derives innovative designs, taking into consideration that MIMO channels are often far from ideal. The various chapters of this book provide an essential, complete and refreshing insight into the performance behaviour of... more...
]]>
Tue, 19 May 2020 08:24:11 GMT
Progress in Cryptology -- INDOCRYPT 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings (Lecture Notes in Computer Science) (by Willi Meier, Debdeep Mukhopadhyay) https://www.books-share.com/ebook/progress-in-cryptology-indocrypt-2014-15th-international-conference-on-cryptology-in-india-new-delhi-india-december-14-17-2014-proceedings-lecture
Author(s): Willi Meier, Debdeep Mukhopadhyay
Categories: Computers > Cryptography, Computers > Networking, Computers > Programming
Publisher: Springer
Publish date: 2014-11-07
ISBN-10: 3319130382
ISBN-13: 9783319130385
Language: English
Description: This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014.   The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protected hardware design; elliptic curves.
]]>
Tue, 19 May 2020 07:38:08 GMT