eBooks-share Networking Latest eBooks https://www.books-share.com/rss/computers/networking Latest Networking eBooks from Books-share.com en-us admin@ebooks-share.net admin@ebooks-share.net Fri, 18 Oct 2019 04:36:11 GMT Books-share.com https://www.books-share.com/images/logo.png https://www.books-share.com/ 158 57 Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain (by Anthimos Alexandros Tsirigotis) https://www.books-share.com/ebook/cybernetics-warfare-and-discourse-the-cybernetisation-of-warfare-in-britain
Author(s): Anthimos Alexandros Tsirigotis
Categories: Computers > Computer Science, Computers > Cryptography, Computers > Networking, Political Science > History & Theory
Publisher: Palgrave Macmillan
Publish date: 2017-04-09
ISBN-10: 3319508466
ISBN-13: 9783319508467
Language: English
Description: This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood concept. Rather than outlining cyberspace as a new technology applied in military operations, here, Tsirigotis rallies against this technocentric account and establishes how cyberspace, first and foremost, should be categorized as a new way to understand war and military power in the Information Age. Using genre analysis and Corpus Linguistics, the author scrutinizes how cyberspace has changed the way the UK comprehends war and military power, and how the cybernetisation of war has manifested... more...
]]>
Fri, 18 Oct 2019 04:36:11 GMT
Multiagent Scheduling: Models and Algorithms (by Stanislaw Gawiejnowicz, Jean-Charles Billaut, Alessandro Agnetis, Dario Pacciarelli, Ameur Soukhal) https://www.books-share.com/ebook/multiagent-scheduling-models-and-algorithms
Author(s): Stanislaw Gawiejnowicz, Jean-Charles Billaut, Alessandro Agnetis, Dario Pacciarelli, Ameur Soukhal
Categories: Business & Economics > Operations Research, Computers > Computer Science, Computers > Internet, Computers > Networking, Computers > Programming
Publisher: Springer
Publish date: 2014-02-28
ISBN-10: 3642418791
ISBN-13: 9783642418792
Language: English
Description: Scheduling theory has received a growing interest since its origins in the second half of the 20th century. Developed initially for the study of scheduling problems with a single objective, the theory has been recently extended to problems involving multiple criteria. However, this extension has still left a gap between the classical multi-criteria approaches and some real-life problems in which not all jobs contribute to the evaluation of each criterion. In this book, we close this gap by presenting and developing multi-agent scheduling models in which subsets of jobs sharing the same resources are evaluated by different... more...
]]>
Thu, 17 Oct 2019 20:16:08 GMT
Proceedings of the Seventh International Conference on Management Science and Engineering Management: Focused on Electrical and Information Technology ... II (Lecture Notes in Electrical Engineering) (by Jiuping Xu, John A. Fry, Benjamin Lev, Asaf Hajiyev) https://www.books-share.com/ebook/proceedings-of-the-seventh-international-conference-on-management-science-and-engineering-management-focused-on-electrical-and-information-technology
Author(s): Jiuping Xu, John A. Fry, Benjamin Lev, Asaf Hajiyev
Categories: Business & Economics > Information Management, Business & Economics > Operations Research, Business & Economics > Production & Operations Management, Computers > Computer Science, Computers > Networking
Publisher: Springer
Publish date: 2013-10-31
ISBN-10: 3642400809
ISBN-13: 9783642400803
Language: English
Description: This book presents the proceedings of the Seventh International Conference on Management Science and Engineering Management (ICMSEM2013) held from November 7 to 9, 2013 at Drexel University, Philadelphia, Pennsylvania, USA and organized by the International Society of Management Science and Engineering Management, Sichuan University (Chengdu, China) and Drexel University (Philadelphia, Pennsylvania, USA). The goals of the Conference are to foster international research collaborations in Management Science and Engineering Management as well as to provide a forum to present current research findings. The selected papers cover various areas in... more...
]]>
Thu, 17 Oct 2019 19:42:06 GMT
Real-time Security Extensions for EPCglobal Networks: Case Study for the Pharmaceutical Industry (In-Memory Data Management Research) (by Matthieu-P. Schapranow) https://www.books-share.com/ebook/real-time-security-extensions-for-epcglobal-networks-case-study-for-the-pharmaceutical-industry-in-memory-data-management-research
Author(s): Matthieu-P. Schapranow
Categories: Business & Economics > Information Management, Computers > Networking, Computers > Programming, Reference > General, Computers > Development
Publisher: Springer
Publish date: 2013-07-03
ISBN-10: 3642363423
ISBN-13: 9783642363429
Language: English
Description: The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory... more...
]]>
Thu, 17 Oct 2019 18:12:02 GMT
Enterprise, Business-Process and Information Systems Modeling: 15th International Conference, BPMDS 2014, 19th International Conference, EMMSAD 2014, ... Notes in Business Information Processing) (by John Krogstie, Selmin Nurcan, Pnina Soffer, Rainer Schmidt, Ilia Bider, Khaled Gaaloul, Henderik A. Proper) https://www.books-share.com/ebook/enterprise-business-process-and-information-systems-modeling-15th-international-conference-bpmds-2014-19th-international-conference-emmsad-2014-notes
Author(s): John Krogstie, Selmin Nurcan, Pnina Soffer, Rainer Schmidt, Ilia Bider, Khaled Gaaloul, Henderik A. Proper
Categories: Business & Economics > Information Management, Computers > Networking, Computers > Development, Computers > Software Engineering
Publisher: Springer
Publish date: 2014-06-26
ISBN-10: 3662437449
ISBN-13: 9783662437445
Language: English
Description: This book contains the refereed proceedings of the 15th International Conference on Business Process Modeling, Development and Support (BPMDS 2014) and the 19th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2014), held together with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014) in Thessaloniki, Greece, in June 2014. The 20 full papers accepted for BPMDS were selected from 48 submissions and cover a wide spectrum of issues related to business process development, modeling, and support. They are grouped into topical sections on... more...
]]>
Thu, 17 Oct 2019 18:02:05 GMT
A Course in In-Memory Data Management: The Inner Mechanics of In-Memory Databases (by Hasso Plattner) https://www.books-share.com/ebook/a-course-in-in-memory-data-management-the-inner-mechanics-of-in-memory-databases-1
Author(s): Hasso Plattner
Categories: Business & Economics > Information Management, Computers > Database Management, Computers > Networking
Publisher: Springer
Publish date: 2014-06-30
ISBN-10: 3642552692
ISBN-13: 9783642552694
Language: English
Description: Recent achievements in hardware and software development, such as multi-core CPUs and DRAM capacities of multiple terabytes per server, enabled the introduction of a revolutionary technology: in-memory data management. This technology supports the flexible and extremely fast analysis of massive amounts of enterprise data. Professor Hasso Plattner and his research group at the Hasso Plattner Institute in Potsdam, Germany, have been investigating and teaching the corresponding concepts and their adoption in the software industry for years. This book is based on an online course that was first launched in autumn 2012 with more... more...
]]>
Thu, 17 Oct 2019 17:52:06 GMT
Information Systems, Management, Organization and Control: Smart Practices and Effects (Lecture Notes in Information Systems and Organisation) (by Cecilia Rossignoli, Daniela Baglieri, Concetta Metallo, Mario Pezzillo Iacono) https://www.books-share.com/ebook/information-systems-management-organization-and-control-smart-practices-and-effects-lecture-notes-in-information-systems-and-organisation
Author(s): Cecilia Rossignoli, Daniela Baglieri, Concetta Metallo, Mario Pezzillo Iacono
Categories: Business & Economics > Information Management, Business & Economics > Management, Business & Economics > Production & Operations Management, Computers > Internet, Computers > Networking
Publisher: Springer
Publish date: 2014-07-15
ISBN-10: 3319079042
ISBN-13: 9783319079042
Language: English
Description: This book explores the diversity of topics, views and perspectives focused on the relationship between information systems, organizations and managerial control. It brings together theories and practices by a diverse group of scholars working in different disciplines: organization, management, accounting, information systems development, human-computer interaction. The volume is divided into three sections, each one focusing on a specific theme: organizational change, innovation and information and communication technologies; organizational control, accounting and information systems; information, knowledge and project management practices.... more...
]]>
Thu, 17 Oct 2019 17:32:09 GMT
Proceedings of the Seventh International Conference on Management Science and Engineering Management: Focused on Electrical and Information Technology ... I (Lecture Notes in Electrical Engineering) (by Jiuping Xu, John A. Fry, Benjamin Lev, Asaf Hajiyev) https://www.books-share.com/ebook/proceedings-of-the-seventh-international-conference-on-management-science-and-engineering-management-focused-on-electrical-and-information-technology-1
Author(s): Jiuping Xu, John A. Fry, Benjamin Lev, Asaf Hajiyev
Categories: Business & Economics > Information Management, Business & Economics > Operations Research, Business & Economics > Production & Operations Management, Computers > Computer Science, Computers > Networking
Publisher: Springer
Publish date: 2013-10-31
ISBN-10: 3642400779
ISBN-13: 9783642400773
Language: English
Description: This book presents the proceedings of the Seventh International Conference on Management Science and Engineering Management (ICMSEM2013) held from November 7 to 9, 2013 at Drexel University, Philadelphia, Pennsylvania, USA and organized by the International Society of Management Science and Engineering Management, Sichuan University (Chengdu, China) and Drexel University (Philadelphia, Pennsylvania, USA). The goals of the Conference are to foster international research collaborations in Management Science and Engineering Management as well as to provide a forum to present current research findings. The selected papers cover various areas in... more...
]]>
Thu, 17 Oct 2019 17:16:03 GMT
Business Models in the Software Industry: The Impact on Firm and M&A Performance (by Markus Schief) https://www.books-share.com/ebook/business-models-in-the-software-industry-the-impact-on-firm-and-manda-performance
Author(s): Markus Schief
Categories: Business & Economics > Information Management, Business & Economics > Management Science, Computers > Networking
Publisher: Springer Gabler
Publish date: 2013-12-27
ISBN-10: 3658043512
ISBN-13: 9783658043513
Language: English
Description: The relevance of software business models has tremendously increased in recent years. Markus Schief explores opportunities to improve the management of these models. Based on a conceptual framework of software business model characteristics, he conducts large empirical studies to examine the current state of business models in the software industry. These data then serve as a foundation for statistical analyses of business models’ impact on firm and M&A performance. Finally, the author develops a software business model management tool.
]]>
Thu, 17 Oct 2019 16:42:02 GMT
New Developments and Applications in Sensing Technology (Lecture Notes in Electrical Engineering) (by Subhas C Mukhopadhyay, Aimé Lay-Ekuakille, Anton Fuchs) https://www.books-share.com/ebook/new-developments-and-applications-in-sensing-technology-lecture-notes-in-electrical-engineering
Author(s): Subhas C Mukhopadhyay, Aimé Lay-Ekuakille, Anton Fuchs
Categories: Computers > Hardware, Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Springer
Publish date: 2011-01-20
ISBN-10: 3642179428
ISBN-13: 9783642179426
Language: English
Description: This book has focussed on different aspects of smart sensors and sensing technology, i.e. intelligent measurement, information processing, adaptability, recalibration, data fusion, validation,  high reliability and integration of novel and high performance sensors in the areas of magnetic, ultrasonic, vision and image sensing, wireless sensors and network, microfluidic, tactile, gyro, flow, surface acoustic wave, humidity and ultra-wide band. While future interest in this field is ensured by the constant supply of emerging modalities, techniques and engineering solutions, as well as an increasing need from aging structures, many of the basic... more...
]]>
Thu, 17 Oct 2019 04:56:01 GMT
Algebraic Cryptanalysis (by Gregory V. Bard) https://www.books-share.com/ebook/algebraic-cryptanalysis
Author(s): Gregory V. Bard
Categories: Computers > Cryptography, Computers > Information Theory, Computers > Networking, Mathematics > Algebra, Mathematics > Geometry
Publisher: Springer
Publish date: 2009-08-24
ISBN-10: 0387887563
ISBN-13: 9780387887562
Language: English
Description: Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois. Topics include: Analytic Combinatorics, and its application to cryptanalysis The equicomplexity of linear algebra operations Graph coloring Factoring integers... more...
]]>
Wed, 16 Oct 2019 16:26:02 GMT
Cabling: The Complete Guide to Network Wiring, 3rd Edition (by Jim McBee, David Barnett, David Groth) https://www.books-share.com/ebook/cabling-the-complete-guide-to-network-wiring-3rd-edition
Author(s): Jim McBee, David Barnett, David Groth
Categories: Computers > Certification Guides, Computers > Hardware, Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Sybex
Publish date: 2004-07-21
ISBN-10: 0782143318
ISBN-13: 9780782143317
Language: English
Description: The physical linkages responsible for carrying a company's data continue to be the most neglected components of the typical network—to the extent that nearly 70% of all network-related problems result from poor cabling.In this third edition of a widely acclaimed resource, three networking experts share their extensive experience, teaching you the cabling skills you need to build a reliable, efficient, and cost-effective network cabling infrastructure. As you master these techniques, you'll learn to avoid common pitfalls and troubleshoot problems as quickly as they arise. Coverage includes:Choosing the right cables and components for your network... more...
]]>
Wed, 16 Oct 2019 06:56:02 GMT
Probability and Random Processes for Electrical and Computer Engineers, Second Edition (by Charles Therrien, Murali Tummala) https://www.books-share.com/ebook/probability-and-random-processes-for-electrical-and-computer-engineers-second-edition
Author(s): Charles Therrien, Murali Tummala
Categories: Computers > Computer Science, Computers > Networking
Publisher: CRC Press
Publish date: 2011-09-20
ISBN-10: 1439826986
ISBN-13: 9781439826980
Language: English
Description: With updates and enhancements to the incredibly successful first edition, Probability and Random Processes for Electrical and Computer Engineers, Second Edition retains the best aspects of the original but offers an even more potent introduction to probability and random variables and processes. Written in a clear, concise style that illustrates the subject’s relevance to a wide range of areas in engineering and physical and computer sciences, this text is organized into two parts. The first focuses on the probability model, random variables and transformations, and inequalities and limit theorems. The second deals with... more...
]]>
Wed, 16 Oct 2019 03:56:02 GMT
UMTS Networks and Beyond (by Cornelia Kappler) https://www.books-share.com/ebook/umts-networks-and-beyond
Author(s): Cornelia Kappler
Categories: Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Wiley
Publish date: 2009-04-07
ISBN-10: 0470031905
ISBN-13: 9780470031902
Language: English
Description: An all-encompassing coverage on UMTS Networks including an in-depth discussion of current work on UMTS evolution and 4G . UMTS Networks and Beyond offers a comprehensive introduction to the networking aspects of UMTS and the networks coming after UMTS. The book is unique in that it systematically compares how a particular problem, e.g. obtaining connectivity, is solved in UMTS and how the same problem is solved in a Computer Network such as the Internet. It also highlights why the respective solutions are so different. The first part of the book provides a detailed technical discussion of UMTS, including original vision,... more...
]]>
Wed, 16 Oct 2019 00:12:08 GMT
Network Security Technologies (by Kwok T. Fung) https://www.books-share.com/ebook/network-security-technologies
Author(s): Kwok T. Fung
Categories: Computers > Certification Guides, Computers > Cryptography, Computers > Networking, Reference > General
Publisher: Auerbach Publications
Publish date: 2004-10-28
ISBN-10: 0849330270
ISBN-13: 9780849330278
Language: English
Description: Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It... more...
]]>
Wed, 16 Oct 2019 00:06:07 GMT
Encryption for Digital Content (Advances in Information Security) (by Aggelos Kiayias, Serdar Pehlivanoglu) https://www.books-share.com/ebook/encryption-for-digital-content-advances-in-information-security
Author(s): Aggelos Kiayias, Serdar Pehlivanoglu
Categories: Computers > Computer Science, Computers > Cryptography, Computers > Hardware, Computers > Information Theory, Computers > Networking
Publisher: Springer
Publish date: 2010-11-02
ISBN-10: 1441900438
ISBN-13: 9781441900432
Language: English
Description: Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS... more...
]]>
Tue, 15 Oct 2019 17:22:02 GMT
Advances in Artificial Economics (Lecture Notes in Economics and Mathematical Systems) (by Benoit Gaudou, Frédéric Amblard, Francisco J. Miguel, Adrien Blanchet) https://www.books-share.com/ebook/advances-in-artificial-economics-lecture-notes-in-economics-and-mathematical-systems
Author(s): Benoit Gaudou, Frédéric Amblard, Francisco J. Miguel, Adrien Blanchet
Categories: Business & Economics > Economics, Computers > Computer Science, Computers > Hardware, Computers > Networking
Publisher: Springer
Publish date: 2014-11-08
ISBN-10: 3319095773
ISBN-13: 9783319095776
Language: English
Description: ​The book presents a peer-reviewed collection of papers presented during the 10th issue of the Artificial Economics conference, addressing a variety of issues related to macroeconomics, industrial organization, networks, management and finance, as well as purely methodological issues. The field of artificial economics covers a broad range of methodologies relying on computer simulations in order to model and study the complexity of economic and social phenomena. The grounding principle of artificial economics is the analysis of aggregate properties of simulated systems populated by interacting adaptive agents that are equipped with heterogeneous... more...
]]>
Tue, 15 Oct 2019 15:36:07 GMT
Internetworking Troubleshooting Handbook (2nd Edition) (Core (Cisco)) (by Inc. Cisco Systems) https://www.books-share.com/ebook/internetworking-troubleshooting-handbook-2nd-edition-core-cisco
Author(s): Inc. Cisco Systems
Categories: Computers > Networking, Computers > Software
Publisher: Cisco Press
Publish date: 2001-02-14
ISBN-10: 1587050056
ISBN-13: 9781587050053
Language: English
Description: An essential reference for solving difficult networking problems Learn from a general problem-solving model for troubleshooting internetworks Understand the difference between connectivity and performance problems Develop a strategy for isolating problem Investigate a variety of troubleshooting tools on the market and those currently in development Study dozens of problem scenarios for popular multiprotocol networks and internetworks Created in conjunction with Cisco Systems' Technical Assistance Center (TAC), Internetworking Troubleshooting Handbook, Second Edition helps you diagnose and resolve... more...
]]>
Tue, 15 Oct 2019 09:26:02 GMT
Google Web Toolkit Solutions: More Cool & Useful Stuff (by David Geary, Rob Gordon) https://www.books-share.com/ebook/google-web-toolkit-solutions-more-cool-and-useful-stuff
Author(s): David Geary, Rob Gordon
Categories: Computers > Networking, Computers > Programming, Computers > Programming Languages, Reference > General, Computers > Software
Publisher: Prentice Hall
Publish date: 2007-11-17
ISBN-10: 0132344815
ISBN-13: 9780132344814
Language: English
Description: Cu>   Google Web Toolkit (GWT) is an open source Java development framework for building Ajax-enabled web applications. Instead of the hodgepodge of technologies that developers typically use for Ajax–JavaScript, HTML, CSS, and XMLHttpRequest–GWT lets developers implement rich client applications with pure Java, using familiar idioms from the AWT, Swing, and SWT. GWT goes beyond most Ajax frameworks by making it easy to build desktop-like applications that run in the ubiquitous browser, where the richness of the user interface is limited only by the developer’s imagination.   This book focuses on the more advanced aspects of GWT that you... more...
]]>
Tue, 15 Oct 2019 08:46:10 GMT
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition ((ISC)2 Press) (by Adam Gordon) https://www.books-share.com/ebook/official-isc-2-guide-to-the-cissp-cbk-fourth-edition-isc-2-press
Author(s): Adam Gordon
Categories: Computers > Computer Science, Computers > Cryptography, Computers > Networking
Publisher: Auerbach Publications
Publish date: 2015-03-11
ISBN-10: 1482262754
ISBN-13: 9781482262759
Language: English
Description: As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. Refreshed technical content has been added to the official (ISC)² CISSP CBK to... more...
]]>
Tue, 15 Oct 2019 06:46:13 GMT
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them (by Michael Howard, David LeBlanc, John Viega) https://www.books-share.com/ebook/24-deadly-sins-of-software-security-programming-flaws-and-how-to-fix-them
Author(s): Michael Howard, David LeBlanc, John Viega
Categories: Computers > Networking
Publisher: McGraw-Hill Osborne Media
Publish date: 2009-09-03
ISBN-10: 0071626751
ISBN-13: 9780071626750
Language: English
Description: "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities Fully updated to cover the latest security issues, 24 Deadly... more...
]]>
Tue, 15 Oct 2019 00:36:01 GMT
Implementing SSH: Strategies for Optimizing the Secure Shell (by Himanshu Dwivedi) https://www.books-share.com/ebook/implementing-ssh-strategies-for-optimizing-the-secure-shell
Author(s): Himanshu Dwivedi
Categories: Computers > Cryptography, Computers > Networking, Computers > Operating Systems, Computers > Software
Publisher: Wiley
Publish date: 2003-10-31
ISBN-10: 0471458805
ISBN-13: 9780471458807
Language: English
Description: A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your networkPrevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the... more...
]]>
Mon, 14 Oct 2019 23:16:08 GMT
Over-the-Road Wireless For Dummies (For Dummies (Computers)) (by E. Phil Haley) https://www.books-share.com/ebook/over-the-road-wireless-for-dummies-for-dummies-computers
Author(s): E. Phil Haley
Categories: Computers > Networking, Computers > Software
Publisher: For Dummies
Publish date: 2006-08-07
ISBN-10: 0471784036
ISBN-13: 9780471784036
Language: English
Description: Do you roam the road making a living, or are you enjoying the nomadic life of a retiree with a motor home? Either way, life goes on no matter where you're hanging your hat tonight. Bills still need to be paid, grandchildren grow up way too fast, and you've gotten pretty dependent on your e-mail. How do you stay connected to the rest of the world while you're on the road? For a growing number of over-the-road drivers, business travelers, and RV enthusiasts, the answer is a wireless Internet connection. With a laptop and wireless access, you can Pay bills, check accounts, and handle banking online Send and receive e-mail Surf the... more...
]]>
Mon, 14 Oct 2019 22:06:05 GMT
Linux System Administration, Second Edition (Craig Hunt Linux Library) (by Roderick W. Smith, Vicki Stanfield) https://www.books-share.com/ebook/linux-system-administration-second-edition-craig-hunt-linux-library
Author(s): Roderick W. Smith, Vicki Stanfield
Categories: Computers > Networking, Computers > Operating Systems, Computers > Software
Publisher: Sybex
Publish date: 2002-09-09
ISBN-10: 0782141382
ISBN-13: 9780782141382
Language: English
Description: "Most Indispensable Linux Book" --2001 Linux Journal Readers Choice Awards Authoritative Answers to All Your Linux Questions You can rely on the fully updated second edition of Linux System Administration for answers to all your questions about installing, configuring, and administering Linux. Written by two Linux experts, this book teaches you, step-by-step, all the standard and advanced techniques you need to know to set up and maintain a secure, effective Linux environment. Scores of clear, consistent examples illustrate these techniques in detail--so you stay on track and accomplish all your goals. Coverage includes: * Installing a Linux... more...
]]>
Mon, 14 Oct 2019 21:32:05 GMT
IP over WDM: Building the Next Generation Optical Internet (by Sudhir Dixit) https://www.books-share.com/ebook/ip-over-wdm-building-the-next-generation-optical-internet
Author(s): Sudhir Dixit
Categories: Computers > Computer Science, Computers > Networking, Science > Optics, Computers > Software
Publisher: Wiley-Interscience
Publish date: 2003-03-28
ISBN-10: 0471212482
ISBN-13: 9780471212485
Language: English
Description: The key technology to delivering maximum bandwidth over networks is Dense Wave-length Division Multiplexing (DWDM) Describes in detail how DWDM works and how to implement a range of transmission protocols Covers device considerations, the pros and cons of various network layer protocols, and quality of service (QoS) issues The authors are leading experts in this field and provide real-world implementation examples First book to describe the interplay between the physical and IP (Internet Protocol) layers in optical networks
]]>
Mon, 14 Oct 2019 20:12:05 GMT
Wireless Sensor Networks: Architectures and Protocols (by Edgar H. Callaway Jr.) https://www.books-share.com/ebook/wireless-sensor-networks-architectures-and-protocols
Author(s): Edgar H. Callaway Jr.
Categories: Computers > Certification Guides, Computers > Networking
Publisher: Auerbach Publications
Publish date: 2003-08-26
ISBN-10: 0849318238
ISBN-13: 9780849318238
Language: English
Description: Because they provide practical machine-to-machine communication at a very low cost, the popularity of wireless sensor networks is expected to skyrocket in the next few years, duplicating the recent explosion of wireless LANs. Wireless Sensor Networks: Architectures and Protocols describes how to build these networks, from the layers of the communication protocol through the design of network nodes. This overview summarizes the multiple applications of wireless sensor networks, then discusses network device design and the requirements that foster the successful performance of these applications. The book discusses factors affecting network design,... more...
]]>
Mon, 14 Oct 2019 18:46:02 GMT
Handbook of Multimedia for Digital Entertainment and Arts (by Borko Furht) https://www.books-share.com/ebook/handbook-of-multimedia-for-digital-entertainment-and-arts
Author(s): Borko Furht
Categories: Computers > Database Management, Computers > Hardware, Computers > Networking, Computers > Programming, Computers > Web Design
Publisher: Springer
Publish date: 2009-08-05
ISBN-10: 0387890238
ISBN-13: 9780387890234
Language: English
Description: The advances in computer entertainment, multi-player and online games, technology-enabled art, culture and performance have created a new form of entertainment and art. The success of this new field has influenced the development of the digital entertainment industry and related products/services, which has impacted every aspect of our lives. Handbook of Multimedia for Digital Entertainment and Arts is an edited volume contributed by worldwide experts in the field of the new digital and interactive media, and their applications in entertainment and arts. This handbook covers leading edge media technologies, and the latest research applied to... more...
]]>
Mon, 14 Oct 2019 12:36:07 GMT
HTML5 Solutions: Essential Techniques for HTML5 Developers (by Marco Casario, Peter Elst, Charles Brown, Nathalie Wormser, Cyril Hanquez) https://www.books-share.com/ebook/html5-solutions-essential-techniques-for-html5-developers
Author(s): Marco Casario, Peter Elst, Charles Brown, Nathalie Wormser, Cyril Hanquez
Categories: Computers > Networking, Computers > Programming, Computers > Programming Languages, Reference > General, Computers > Web Development
Publisher: friendsofED
Publish date: 2011-06-14
ISBN-10: 1430233869
ISBN-13: 9781430233862
Language: English
Description: HTML5 brings the biggest changes that HTML has seen in years. Web designers and developers now have a whole host of new techniques up their sleeves, from displaying video and audio natively in HTML, to creating realtime graphics directly on a web page without the need for a plugin. But all of these new technologies bring more tags to learn and more avenues for things to go wrong. HTML5 Solutions provides a collection of solutions to all of the most common HTML5 problems. Every solution contains sample code that is production-ready and can be applied to any project. What you’ll learnReal-world solutions for everyday HTML... more...
]]>
Mon, 14 Oct 2019 10:36:10 GMT
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research (by David Maynor) https://www.books-share.com/ebook/metasploit-toolkit-for-penetration-testing-exploit-development-and-vulnerability-research
Author(s): David Maynor
Categories: Computers > Cryptography, Computers > Internet, Computers > Networking, Computers > Operating Systems, Computers > Programming
Publisher: Syngress
Publish date: 2007-10-02
ISBN-10: 1597490741
ISBN-13: 9781597490740
Language: English
Description: This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code. This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an... more...
]]>
Mon, 14 Oct 2019 10:06:02 GMT
Network Science: Complexity in Nature and Technology (by Desmond J. Higham, Ernesto Estrada, Maria Fox, Gian-Luca Oppo) https://www.books-share.com/ebook/network-science-complexity-in-nature-and-technology
Author(s): Desmond J. Higham, Ernesto Estrada, Maria Fox, Gian-Luca Oppo
Categories: Computers > Networking, Computers > Programming, Mathematics > General, Science > System Theory, Technology & Engineering > Engineering (General)
Publisher: Springer
Publish date: 2010-09-17
ISBN-10: 1849963959
ISBN-13: 9781849963954
Language: English
Description: Network Science is the emerging field concerned with the study of large, realistic networks. This interdisciplinary endeavor, focusing on the patterns of interactions that arise between individual components of natural and engineered systems, has been applied to data sets from activities as diverse as high-throughput biological experiments, online trading information, smart-meter utility supplies, and pervasive telecommunications and surveillance technologies. This unique text/reference provides a fascinating insight into the state of the art in network science, highlighting the commonality across very different areas of application and the ways... more...
]]>
Mon, 14 Oct 2019 07:46:01 GMT
Computer Viruses: from theory to applications (Collection IRIS) (by Éric Filiol) https://www.books-share.com/ebook/computer-viruses-from-theory-to-applications-collection-iris
Author(s): Éric Filiol
Categories: Computers > Computer Science, Computers > Information Theory, Computers > Networking, Computers > Programming, Mathematics > General
Publisher: Springer
Publish date: 2005-09-14
ISBN-10: 2287239391
ISBN-13: 9782287239397
Language: English
Description: This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions enable a precise and exhaustive description of the different types of malware. It follows that the main stakes of computer defense and antiviral fighting are easily highlighted. Detailed analysis of the source code for representative members of each virus/worm family allows the reader to grasp the basic... more...
]]>
Mon, 14 Oct 2019 07:22:11 GMT
Cyber Situational Awareness: Issues and Research (Advances in Information Security) (by Sushil Jajodia, Vipin Swarup, Cliff Wang, Peng Liu) https://www.books-share.com/ebook/cyber-situational-awareness-issues-and-research-advances-in-information-security
Author(s): Sushil Jajodia, Vipin Swarup, Cliff Wang, Peng Liu
Categories: Computers > Cryptography, Computers > Hardware, Computers > Information Theory, Computers > Internet, Computers > Networking
Publisher: Springer
Publish date: 2009-10-28
ISBN-10: 1441901396
ISBN-13: 9781441901392
Language: English
Description: Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question can be well answered, is greatly dependent upon the cyber situational awareness capability of enterprises. Cyber Situational Awareness: Issues and Research is an edited volume contributed by worldwide cyber security experts. This book seeks to establish state of the art in cyber situational awareness area to set course for future research. A multidisciplinary... more...
]]>
Mon, 14 Oct 2019 07:22:01 GMT
Cognitive (Internet of) Things: Collaboration to Optimize Action (by Arvind Sathi) https://www.books-share.com/ebook/cognitive-internet-of-things-collaboration-to-optimize-action
Author(s): Arvind Sathi
Categories: Computers > Database Management, Computers > Internet, Computers > Networking, Mathematics > Probability & Statistics, Technology & Engineering > General
Publisher: Palgrave Macmillan
Publish date: 2016-09-23
ISBN-10: 1137594659
ISBN-13: 9781137594655
Language: English
Description: This book explores cognitive behavior among Internet of Things.  Using a series of current and futuristic examples – appliances, personal assistants, robots, driverless cars, customer care, engineering, monetization, and many more – the book covers use cases, technology and communication aspects of how machines will support individuals and organizations.  This book examines the Cognitive Things covering a number of important questions: •      What are Cognitive Things?   •      What applications can be driven from Cognitive Things... more...
]]>
Mon, 14 Oct 2019 07:16:04 GMT
Information Development: Managing Your Documentation Projects, Portfolio, and People (by JoAnn T. Hackos) https://www.books-share.com/ebook/information-development-managing-your-documentation-projects-portfolio-and-people
Author(s): JoAnn T. Hackos
Categories: Art > Design, Computers > Networking, Computers > Project Management, Fiction > General
Publisher: Wiley
Publish date: 2006-12-26
ISBN-10: 0471777110
ISBN-13: 9780471777113
Language: English
Description: A revolutionary new resource that brings documentation product management ideas up to date The 1994 bestselling classic Managing Your Documentation Projects set the industry standard for technical documentation. However, since then, much has changed in the world of information development. With this new title, JoAnn Hackos looks beyond the structured project of the 1980s and 1990s. Instead, she focuses on the rapidly changing projects of the 21st century and addresses how to introduce agile information development without neglecting the central focus of planning information design and development around the needs of information... more...
]]>
Mon, 14 Oct 2019 04:12:11 GMT
Emerging Wireless LANs, Wireless PANs, and Wireless MANs: IEEE 802.11, IEEE 802.15, 802.16 Wireless Standard Family (Wiley Series on Parallel and Distributed Computing) (by Yang Xiao, Yi Pan) https://www.books-share.com/ebook/emerging-wireless-lans-wireless-pans-and-wireless-mans-ieee-802-11-ieee-802-15-802-16-wireless-standard-family-wiley-series-on-parallel-and
Author(s): Yang Xiao, Yi Pan
Categories: Computers > Networking, Computers > Programming, Technology & Engineering > Engineering (General)
Publisher: Wiley
Publish date: 2009-04-13
ISBN-10: 0471720690
ISBN-13: 9780471720690
Language: English
Description: A thoroughly up-to-date resource on IEEE 802 wireless standards Readers can turn to this book for complete coverage of the current and emerging IEEE 802 wireless standards/drafts, including: 802.11 Wireless LANs 802.15.1 Bluetooth and 801.15.2 802.15.3 Wireless PANs 802.15.4 and 802.15.5 Wireless PANs 802.16 Wireless MANs Emerging Wireless LANs, Wireless PANs, and Wireless MANs is a unique, convenient resource for engineers, scientists, and researchers in academia and industry. It also serves as a valuable textbook for... more...
]]>
Mon, 14 Oct 2019 03:32:02 GMT
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System (by Bill Blunden) https://www.books-share.com/ebook/the-rootkit-arsenal-escape-and-evasion-in-the-dark-corners-of-the-system
Author(s): Bill Blunden
Categories: Computers > Networking
Publisher: Jones & Bartlett Learning
Publish date: 2012-03-16
ISBN-10: 144962636X
ISBN-13: 9781449626365
Language: English
Description: While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has... more...
]]>
Mon, 14 Oct 2019 01:26:04 GMT
MPLS and VPN Architectures (by Jim Guichard, Ivan Pepelnjak) https://www.books-share.com/ebook/mpls-and-vpn-architectures-1
Author(s): Jim Guichard, Ivan Pepelnjak
Categories: Computers > Certification Guides, Computers > Hardware, Computers > Networking
Publisher: Cisco Press
Publish date: 2000-10-31
ISBN-10: 1587050021
ISBN-13: 9781587050022
Language: English
Description: A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture Detailed discussion of the mechanisms and features that constitute the architecture Learn how MPLS scales to support tens of thousands of VPNs Extensive case studies guide you through the design and deployment of real-world MPLS/VPN networks Configuration examples and guidelines assist in configuring MPLS on Cisco® devices Design and implementation options help you build various VPN topologies Multiprotocol Label Switching (MPLS) is an... more...
]]>
Mon, 14 Oct 2019 00:32:08 GMT
Mobile Telecommunications Protocols for Data Networks (by Anna Hac) https://www.books-share.com/ebook/mobile-telecommunications-protocols-for-data-networks
Author(s): Anna Hac
Categories: Computers > Certification Guides, Computers > Networking, Technology & Engineering > Engineering (General)
Publisher: Wiley
Publish date: 2002-11-15
ISBN-10: 0470850566
ISBN-13: 9780470850565
Language: English
Description: Mobile users are demanding fast and efficient ubiquitous connectivity supporting data applications. This connectivity has to be provided by various different networks and protocols which guarantee that mobile networks function efficiently, performing routing and handoff for mobile users. Hac proposes a comprehensive design for mobile communications including mobile agents, access networks, application protocols, ubiquitous connectivity, routing, and handoff. It covers the entire spectrum of lower and upper layer protocols to evaluate and design modern mobile telecommunications systems. Furthermore, the aspects of modern mobile telecommunications... more...
]]>
Mon, 14 Oct 2019 00:26:08 GMT
The Handbook of Optical Communication Networks (Electrical Engineering Handbook) (by Mohammad Ilyas, Hussein T. Mouftah) https://www.books-share.com/ebook/the-handbook-of-optical-communication-networks-electrical-engineering-handbook
Author(s): Mohammad Ilyas, Hussein T. Mouftah
Categories: Computers > Networking, Science > Light, Science > Optics
Publisher: CRC Press
Publish date: 2003-04-14
ISBN-10: 0849313333
ISBN-13: 9780849313332
Language: English
Description: The Internet revolution. Once, the public was delighted with 14.4 modem access and fascinated by low-tech Web site content. But not for long. Technology has raced to keep up with users' calls for high-speed facilities and advanced applications. With the development of high-speed transmission media and the availability of high-speed hardware, we are fast approaching the day when a single communication network will support all communication activities-and that network will use optical fibers as its transmission media and optical switch/routers as its nodes. The Handbook of Optical Communication Networks presents comprehensive, up-to-date technical... more...
]]>
Mon, 14 Oct 2019 00:22:02 GMT
Pro SharePoint 2010 Administration (Professional Apress) (by Rob Garrett) https://www.books-share.com/ebook/pro-sharepoint-2010-administration-professional-apress
Author(s): Rob Garrett
Categories: Computers > Computer Science, Computers > Networking, Computers > Operating Systems, Computers > Software
Publisher: Apress
Publish date: 2011-11-23
ISBN-10: 1430237929
ISBN-13: 9781430237921
Language: English
Description: Pro SharePoint 2010 Administration is a practical guide to SharePoint 2010 for intermediate to advanced SharePoint administrators and power users, covering the out-of-the-box feature set and capabilities of Microsoft's collaboration and business productivity platform. SharePoint 2010 is an incredibly complex product, with many moving parts, new features, best practices, and "gotchas." Author Rob Garrett distills SharePoint's portfolio of features, capabilities, and utilities into an in-depth professional guide—with no fluff and copious advice—that is designed from scratch to be the manual Microsoft never wrote. Starting with a detailed... more...
]]>
Sat, 12 Oct 2019 19:12:04 GMT
Pro SharePoint with jQuery (by Phill Duffy) https://www.books-share.com/ebook/pro-sharepoint-with-jquery
Author(s): Phill Duffy
Categories: Computers > Computer Science, Computers > Networking, Reference > General, Computers > Development, Computers > Software
Publisher: Apress
Publish date: 2012-02-29
ISBN-10: 1430240989
ISBN-13: 9781430240983
Language: English
Description: Pro SharePoint with jQuery is all about how to work seamlessly with the two popular technologies to create rich and interactive web parts, application pages, and more. In this book, author Phill Duffy provides complete, meaningful and realistic examples to really help you understand the key concepts and their integration points. Inside, you'll find all the tools and resources you need to use jQuery to provide the next level of SharePoint functionality. Learn what it takes to get ready to use jQuery, how to create rich, responsive, and highly functional user interfaces, how to call the SharePoint web services and work with HTML elements, and... more...
]]>
Sat, 12 Oct 2019 19:12:02 GMT
Android Security: Attacks and Defenses (by Anmol Misra, Abhishek Dubey) https://www.books-share.com/ebook/android-security-attacks-and-defenses
Author(s): Anmol Misra, Abhishek Dubey
Categories: Computers > Networking, Computers > Development
Publisher: Auerbach Publications
Publish date: 2013-04-08
ISBN-10: 1439896461
ISBN-13: 9781439896464
Language: English
Description: Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and... more...
]]>
Sat, 12 Oct 2019 10:28:50 GMT
The Kubernetes Book (by Nigel Poulton) https://www.books-share.com/ebook/the-kubernetes-book
Author(s): Nigel Poulton
Categories: Computers > Computer Science, Computers > Networking
Publisher: Independently published
Publish date: 2017-07-12
ISBN-10: 1521823634
ISBN-13: 9781521823637
Language: English
Description: Containers are here and resistance is futile! Now that we're getting our heads around Docker, we need an orchestration platform to help us manage our containerized apps. Kubernetes has emerged as the hottest and most important container orchestration platform in the world. This book gets you up to speed fast, and it's constantly kept up-to-date!
]]>
Fri, 11 Oct 2019 21:56:14 GMT
Managing Risk and Information Security: Protect to Enable (by Malcolm Harkins) https://www.books-share.com/ebook/managing-risk-and-information-security-protect-to-enable
Author(s): Malcolm Harkins
Categories: Computers > Computer Science, Computers > Networking
Publisher: Apress
Publish date: 2012-12-17
ISBN-10: 1430251131
ISBN-13: 9781430251132
Language: English
Description: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include... more...
]]>
Fri, 11 Oct 2019 16:33:13 GMT
Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition (by Stuart McClure, Joel Scambray, George Kurtz) https://www.books-share.com/ebook/hacking-exposed-7-network-security-secrets-and-solutions-seventh-edition
Author(s): Stuart McClure, Joel Scambray, George Kurtz
Categories: Computers > Cryptography, Computers > Networking
Publisher: McGraw-Hill Osborne Media
Publish date: 2012-07-11
ISBN-10: 0071780289
ISBN-13: 9780071780285
Language: English
Description: The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment “Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our... more...
]]>
Fri, 11 Oct 2019 16:31:37 GMT
Ad Hoc Networks: 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings (Lecture Notes of the ... and Telecommunications Engineering) (by Yifeng Zhou, Thomas Kunz) https://www.books-share.com/ebook/ad-hoc-networks-9th-international-conference-adhocnets-2017-niagara-falls-on-canada-september-28-29-2017-proceedings-lecture-notes-of-the-and
Author(s): Yifeng Zhou, Thomas Kunz
Categories: Computers > Computer Science, Computers > Cryptography, Computers > Hardware, Computers > Networking
Publisher: Springer
Publish date: 2018-02-24
ISBN-10: 3319744380
ISBN-13: 9783319744384
Language: English
Description: This book constitutes the refereed proceedings of the 9th International Conference on Ad Hoc Networks, AdHocNets 2017, held in Niagara Falls, Ontario, USA, in September 2017. The 19 full papers were selected from 30 submissions and cover a variety of network paradigms including mobile ad hoc networks (MANETs), sensor networks, vehicular networks, underwater networks, airborne networks, underground networks, personal area networks, device-to-device (D2D) communications in 5G cellular networks, and home networks. The papers present a wide range of applications in civilian, commercial, and military areas.
]]>
Thu, 10 Oct 2019 08:56:05 GMT
Pro SharePoint 2013 Administration (by Rob Garrett) https://www.books-share.com/ebook/pro-sharepoint-2013-administration
Author(s): Rob Garrett
Categories: Computers > Computer Science, Computers > Networking, Computers > Operating Systems
Publisher: Apress
Publish date: 2013-05-22
ISBN-10: 1430249412
ISBN-13: 9781430249412
Language: English
Description: Pro SharePoint 2013 Administration is a practical guide to SharePoint 2013 for intermediate to advanced SharePoint administrators and power users, covering the out-of-the-box feature set and capabilities of Microsoft's collaboration and business productivity platform. SharePoint 2013 is an incredibly complex product, with many moving parts, new features, best practices, and "gotchas." Author Rob Garrett distills SharePoint's portfolio of features, capabilities, and utilities into an in-depth professional guide—with no fluff and copious advice—that is designed from scratch to be the manual Microsoft never wrote.... more...
]]>
Thu, 10 Oct 2019 03:12:19 GMT
Optimizing and Troubleshooting Hyper-V Storage (by Mitch Tulloch) https://www.books-share.com/ebook/optimizing-and-troubleshooting-hyper-v-storage
Author(s): Mitch Tulloch
Categories: Computers > Networking, Computers > Operating Systems
Publisher: Microsoft Press
Publish date: 2013-08-01
ISBN-10: 0735678987
ISBN-13: 9780735678989
Language: English
Description: This scenario-focused title provides concise technical guidance and insights for troubleshooting and optimizing storage with Hyper-V. Written by experienced virtualization professionals, this little book packs a lot of value into a few pages, offering a lean read with lots of real-world insights and best practices for Hyper-V storage optimization. Focused guide extends your knowledge and capabilities with Hyper-V storage in Windows Server 2012 Shares hands-on insights from a team of Microsoft virtualization experts Provides pragmatic troubleshooting and optimization guidance from... more...
]]>
Wed, 09 Oct 2019 16:16:08 GMT
Adaptive Cryptographic Access Control (Advances in Information Security) (by Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin) https://www.books-share.com/ebook/adaptive-cryptographic-access-control-advances-in-information-security
Author(s): Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin
Categories: Computers > Cryptography, Computers > Database Management, Computers > Hardware, Computers > Networking
Publisher: Springer
Publish date: 2010-08-18
ISBN-10: 1441966544
ISBN-13: 9781441966544
Language: English
Description: Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential. The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical... more...
]]>
Wed, 09 Oct 2019 16:04:04 GMT
Flash Catalyst CS5 Bible (by Rob Huddleston) https://www.books-share.com/ebook/flash-catalyst-cs5-bible
Author(s): Rob Huddleston
Categories: Computers > Computer Graphics, Computers > Computer Science, Computers > Networking, Computers > Web Design
Publisher: Wiley
Publish date: 2010-05-10
ISBN-10: 0470568151
ISBN-13: 9780470568156
Language: English
Description: Learn to use the new Flash Catalyst to create rich Internet applicationsAdobe Flash Catalyst enables you to take designs from Photoshop and Illustrator and convert them into rich Flash-based applications—without writing or even understanding one line of code. It may sound too good to be true, but this helpful reference shows you how to leverage the Flash skills you already have in order to convert your ideas into functioning applications. You’ll explore everything from the basics of the Flex framework to using Flash Builder to complete conversion of an application.Shows you how to use the eagerly anticipated Flash Catalyst to convert assets... more...
]]>
Wed, 09 Oct 2019 16:04:02 GMT