Search

Search Results

Results 21-30 of 44 (Search time: 0.112 seconds).
Item hits:
  • Book


  • Authors: William Stallings (2007)

  • This timely revision of an all-time best-seller in the field features the clarity and scope of a Stallings classic. This comprehensive volume provides the most up-to-date coverage of the essential topics in data communications, networking, Internet technology and protocols, and standards – all in a convenient modular format. Features updated coverage of multimedia, Gigabit and 10 Gbps Ethernet, WiFi/IEEE 802.11 wireless LANs, security, and much more. Ideal for professional reference or self-study. For Product Development personnel, Programmers, Systems Engineers, Network Designers and others involved in the design of data communications and networking products.

  • Book


  • Authors: Ellen Siever (2009)

  • Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins -- people with years of active participation in the Linux community -- Linux in a Nutshell, Sixth Edition, thoroughly covers programming tools, system and network administration tools, the shell, editors, and LILO and GRUB boot loaders. This updated edition offers a tighter focus on Linux system essentials, as well as more coverage of new capabilities such as virtualization, wireless network management, and revision control with git. It also highlights the most important options for using the vast number of Linux commands. You'll find many helpful new tips and techniques in this reference, whether you're new to this operating system or have been using it...

  • Book


  • Authors: Jeffrey L. Whitten; Lonnie D. Bentley (2008)

  • Nghiên cứu về hệ thống thông tin, dự án phát triển các hệ thống. Các phương pháp phân tích hệ thống và phương pháp thiết kế hệ thống

  • Book


  • Authors: Thomas R. Peltier (2005)

  • The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial process should not be a long, drawn-out affair. To be effective, it must be done quickly and efficiently. Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can be conducted effectively. This book discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. It examines the differences between quantitative and qualitative risk assessment, and details how various types of qualitative risk assessment can be applied to the ...

  • Book


  • Authors: Anna Hać (2003)

  • This book provides a comprehensive source of information from networked embedded systems and smart sensor networks, to power-aware wireless sensors networks, routing, clustering, security and operation systems along with networks support in a single 408 pages volume organized into ten chapters and shows how to design and use such sensor networks. The book is well illustrated and each from its ten chapters is supplemented by learning objectives and followed by well-selected practice problems with solutions.

  • Book


  • Authors: Christopher A. Chung (2004)

  • This book is a practical, easy-to-follow reference that offers up-to-date information and step-by-step procedures for conducting simulation studies. It provides sample simulation project support material, including checklists, data-collection forms, and sample simulation project reports and publications to facilitate practitioners' efforts in conducting simulation modeling and analysis projects.

  • Book


  • Authors: Steven Bird (2009)

  • This is an introduction to natural language processing, which supports a variety of language technologies, from predictive text and email filtering to automatic summarization and translation.