Pro C# with .NET 3.0, Special Edition

Pro C# with .NET 3.0, Special Edition
Author: Andrew Troelsen
Publisher: Apress
Total Pages: 1213
Release: 2007-04-29
Genre: Computers
ISBN: 1430202017

This book provides readers with a complete A-Z for using C# with the .NET 2.0 Platform and the .NET 3.0 extensions. It contains new chapters digging deeply into the interactions between the existing framework and the new extensions to give readers the edge when they come to evaluation and implement .NET 3.0 for the first time. To provide even more support, the book includes a bonus CD that provides over five hundred pages of carefully selected additional content to help broaden a reader’s understanding of both .NET 2.0 and .NET 3.0.

Special Edition Using TCP/IP

Special Edition Using TCP/IP
Author: Ramadas Shanmugam
Publisher: Que Publishing
Total Pages: 520
Release: 2002
Genre: Computers
ISBN: 9780789727091

Special Edition Using TCP/IP, 2E is the practical guide to applications of TCP/IP, including utilities for operation, troubleshooting, and management, with insight into future applications such as Voice over IP and VPNs. It includes current TCP/IP draft standards and future work planned. Clear illustrations of practical utilities enable the reader to understand both the technology and applications together from a single source. It includes current scaling problems in the Internet like addressing and routing. Both short-term solutions and long-term solutions for these problems are discussed.

Automated Biometrics

Automated Biometrics
Author: David D. Zhang
Publisher: Springer Science & Business Media
Total Pages: 336
Release: 2013-11-11
Genre: Computers
ISBN: 1461545196

Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on `something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a database. With rapid progress in electronic and Internet commerce, there is also a growing need to authenticate the identity of a person for secure transaction processing. Designing an automated biometrics system to handle large population identification, accuracy and reliability of authentication are challenging tasks. Currently, there are over ten different biometrics systems that are either widely used or under development. Some automated biometrics, such as fingerprint identification and speaker verification, have received considerable attention over the past 25 years, and some issues like face recognition and iris-based authentication have been studied extensively resulting in successful development of biometrics systems in commercial applications. However, very few books are exclusively devoted to such issues of automated biometrics. Automated Biometrics: Technologies and Systems systematically introduces the technologies and systems, and explores how to design the corresponding systems with in-depth discussion. The issues addressed in this book are highly relevant to many fundamental concerns of both researchers and practitioners of automated biometrics in computer and system security.

Location- and Context-Awareness

Location- and Context-Awareness
Author: Jeffrey Hightower
Publisher: Springer
Total Pages: 306
Release: 2007-09-14
Genre: Computers
ISBN: 3540751602

This book constitutes the refereed proceedings of the Third International Symposium on Location- and Context-Awareness, LoCA 2007, held in Oberpfaffenhofen, Germany, in September 2007. The papers are organized in topical sections on wifi location technology, activity and situational awareness, taxonomies, architectures, and in a broader perspective, the meaning of place, radio issue in location technology, and new approaches to location estimation.

Computer Network Architectures and Protocols

Computer Network Architectures and Protocols
Author: Carl A. Sunshine
Publisher: Springer Science & Business Media
Total Pages: 542
Release: 2013-06-29
Genre: Technology & Engineering
ISBN: 1461308097

This is a book about the bricks and mortar from which are built those edifices that will permeate the emerging information society of the future-computer networks. For many years such computer networks have played an indirect role in our daily lives as the hidden servants of banks, airlines, and stores. Now they are becoming more visible as they enter our offices and homes and directly become part of our work, entertainment, and daily living. The study of how computer networks function is a combined study of communication theory and computer science, two disciplines appearing to have very little in common. The modern communication scientist wishing to work in this area soon finds that solving the traditional problems of transmission, modulation, noise immunity, and error bounds in getting the signal from one point to another is just the beginning of the challenge. The communication must be in the right form to be routed properly, to be handled without congestion, and to be understood at various points in the network. As for the computer scientist, he finds that his discipline has also changed. The fraction of computers that belong to networks is increasing all the time. And for a typical single computer, the fraction of its execution load, storage occupancy, and system management problems that are in volved with being part of a network is also growing.

Concurrency and Nets

Concurrency and Nets
Author: Klaus Voss
Publisher: Springer Science & Business Media
Total Pages: 616
Release: 2012-12-06
Genre: Computers
ISBN: 3642728227

Concurrency and Nets is a special volume in the series "Advances in Petri Nets". Prepared as a tribute to Carl Adam Petri on the occasion of his 60th birthday, it is devoted to an outstanding personality and his pioneering and fruitful scientific work. Part I (70 pages of over 600) presents the congratulatory addresses and invited talks that were given at an Anniversary Colloquium. The contributions of this part honor Carl Adam Petri and his work from many different perspectives. Part II is a collection of invited papers discussing various aspects of the theme Concurrency and Nets. These papers are contributed partly by researchers that were or are still associated with the Petri Institute at GMD and partly by researchers whose scientific work deals with Net Theory or related system models. The topics range from basic theoretical aspects to application oriented methods.