" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 214

: Magento 1 DIY
: Viktor Khliupko
: Apress
: 2017
: PDF, EPUB
: 12
: / English

Learn how Magento 1 works and how to manage it via easy and advanced techniques. Magento continues to be a top choice for eCommerce solutions in small and large businesses, and many systems are still running on Magento 1.x. This book is specifically designed for these versions. Aimed at entrepreneurs, marketers, and other experts interested in eCommerce, Magento 1 DIY shows you how to set up and configure Magento 1 for your own project. You will also learn how to use extensions, templates and enterprise features guided by easy-to-understand, real-world examples.
: black 14-02-2019, 16:39 | : 0 |
: Introducing Materialize
: Anirudh Prabhu and Aravind Shenoy
: Apress
: 2017
: PDF, EPUB
: 10
: / English

This concise step-by-step guide includes the best practices and patterns that help readers of all levels to unearth the potential of Materialize. A responsive framework based on Googles innovative Material Design language, Materialize provides CSS and javascript features similar to other popular frameworks such as Bootstrap and Foundation.
: black 14-02-2019, 16:13 | : 0 |
: Network Security (Networks and Telecommunications Series)
: Andr? P?rez
: Wiley-ISTE
: 2014
: PDF
: 262
: Mirknig.su
: 5 Mb
: English
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.
Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.
The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
: Ice Zero 14-02-2019, 13:00 | : 0 |
: Combinatorial Search: From Algorithms to Systems
: Youssef Hamadi
: Springer
: 2013
: PDF
: 139
: Mirknig.su
: 2 Mb
: English
Although they are believed to be unsolvable in general, tractability results suggest that some practical NP-hard problems can be efficiently solved. Combinatorial search algorithms are designed to efficiently explore the usually large solution space of these instances by reducing the search space to feasible regions and using heuristics to efficiently explore these regions. Various mathematical formalisms may be used to express and tackle combinatorial problems, among them the constraint satisfaction problem (CSP) and the propositional satisfiability problem (SAT). These algorithms, or constraint solvers, apply search space reduction through inference techniques, use activity-based heuristics to guide exploration, diversify the searches through frequent restarts, and often learn from their mistakes.
: Ice Zero 14-02-2019, 11:54 | : 0 |

: Circuits and Systems for Security and Privacy
: Farhana Sheikh, Leonel Sousa
: CRC Press
: 2016
: 400
: PDF
: 12,1 M
: English

This book begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.
: black 13-02-2019, 20:29 | : 0 |
: Artificial Intelligence in IoT
: Fadi Al-Turjman
: Springer
: Transactions on Computational Science and Computational Intelligence
: 2019
: 231
:
: pdf (true), epub
: 26.3 MB

This book provides an insight into IoT intelligence in terms of applications and algorithmic challenges. The book is dedicated to addressing the major challenges in realizing the artificial intelligence in IoT-based applications including challenges that vary from cost and energy efficiency to availability to service quality in multidisciplinary fashion. The aim of this book is hence to focus on both the algorithmic and practical parts of the artificial intelligence approaches in IoT applications that are enabled and supported by wireless sensor networks and cellular networks. Targeted readers are from varying disciplines who are interested in implementing the smart planet/environments vision via intelligent wireless/wired enabling technologies.
: Ingvar16 13-02-2019, 18:41 | : 0 |
: Media and Radio Signal Processing for Mobile Communications
: Kyunghun Jung and Russell M. Mersereau
: Cambridge University Press
: 2018
: PDF
: 34
: / English

Get to grips with the principles and practice of signal processing used in mobile communications systems. Focusing particularly on speech, video, and modem signal processing, pioneering experts employ a detailed, top-down analytical approach to outline the network architectures and protocol structures of multiple generations of mobile communications systems, identify the logical ranges where media and radio signal processing occur, and analyze the procedures for capturing, compressing, transmitting, and presenting media.
: black 13-02-2019, 17:50 | : 0 |
: CISO's Guide to Penetration Testing
: James S. Tiller
: CRC Press
: 2011
: PDF, EPUB
: 12
: / English

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used.
: black 13-02-2019, 17:19 | : 0 |
: Emerging Wireless Communication and Network Technologies: Principle, Paradigm and Performance
: Karm Veer Arya and Robin Singh Bhadoria
: Springer
: 2018
: PDF
: 11
: / English

The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry. The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies.
: black 13-02-2019, 17:17 | : 0 |
: How to Do Everything: iCloud, Second Edition
: Jason R. Rich
: McGraw-Hill Education
: 2014
: PDF
: 27
: / English

This all-new edition of How To Do Everything: iCloud fully covers iClouds versatile features and offers step-by-step directions on how to use each one, including Shared Photo Streams, the iWork for iCloud apps, and iCloud Keychain. Youll learn how to set up iCloud, transfer and sync app-specific data, documents, files, photos, music, and other content among your computers and iOS mobile devices.
: black 12-02-2019, 22:01 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 214




 MirKnig.Su  2018