Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Policies and Procedures (Advances in Information Security)
Network Security Policies and Procedures (Advances in Information Security)
Technology is progressing at an astounding pace, and many organizations are working so hard to implement the technologies they need to survive need to understand how their network security policies and procedures regimen fits into the picture.

As with all technology nowadays, the next significant change is already beginning to happen. As
...
Computable Models
Computable Models
Computational models can be found everywhere in present day science and engineering. In providing a logical framework and foundation for the specification and design of specification languages, Raymond Turner uses this framework to introduce and study computable models. In doing so he presents the first systematic attempt to provide computational...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Bioinformatics: An Introduction (Computational Biology)
Bioinformatics: An Introduction (Computational Biology)
Bioinformatics is interpreted as the application of information science to biology, in which it plays a fundamental and all-pervasive role. The field continues to develop intensively in both academia and commercially, and is highly interdisciplinary. This broad-ranging and thoroughly updated second edition covers new findings while retaining the...
Software Verification and Analysis: An Integrated, Hands-On Approach
Software Verification and Analysis: An Integrated, Hands-On Approach
This book addresses the most important techniques in improving the correctness of software, including correctness by construction (top-down refinement), program proving, static analysis and dynamic, execution-based analysis (testing and debugging).

Three major software verification techniques are discussed: Semantic program synthesis and...

Handbook on Information Technology in Finance (International Handbooks on Information Systems)
Handbook on Information Technology in Finance (International Handbooks on Information Systems)
This Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary research in the intersection between IT and finance. Included are recent trends and challenges, IT systems and architectures in finance, essential developments and case studies on management information systems, service...
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
From the reviews:

"...a useful reference for all biometric security professionals and researchers. The four coauthors have a distinguished combination of academic and professional experience....Overall, readers will be pleased with the style and substance of this book." -Computing Reviews

"This is a comprehensive reviews...

Real Astronomy with Small Telescopes: Step-by-Step Activities for Discovery (Patrick Moore's Practical Astronomy Series)
Real Astronomy with Small Telescopes: Step-by-Step Activities for Discovery (Patrick Moore's Practical Astronomy Series)
From the reviews:

"The dozens of projects collected here are a combination of observations suitable for current research (such as classifying sun-spots or monitoring binary stars) and recreating classic experiments (such as determining the speed of light by timing Jupiter’s moons). … Besides ample nuggets for science projects,...

Information Systems and Data Compression
Information Systems and Data Compression
Information Systems and Data Compression presents a uniform approach and methodology for designing intelligent information systems. A framework for information concepts is introduced for various types of information systems such as communication systems, information storage systems and systems for simplifying structured information. The book...
Quantum Magnetism (Lecture Notes in Physics)
Quantum Magnetism (Lecture Notes in Physics)
Putting the quantum into magnetism might, at first sight, seem like stating the obvious; the exchange interactions leading to collective magnetic behavior are, after all, a pure quantum effect. Yet, for many phenomena in magnetism this underlying quantum nature may be safely ignored at least on the qualitative level. The investigation of magnetic...
Quantum Mechanics of Fundamental Systems: The Quest for Beauty and Simplicity: Claudio Bunster Festschrift
Quantum Mechanics of Fundamental Systems: The Quest for Beauty and Simplicity: Claudio Bunster Festschrift
This is a collection of contributed papers by former collaborators and colleagues of Claudio Bunster (formerly Teitelboim). The topics include General Relativity, Quantum Gravity, String Theory; from historical reviews to current research; from mathematical structures underlying the fundamental interactions, to cosmological scenarios describing the...
Random Curves: Journeys of a Mathematician
Random Curves: Journeys of a Mathematician
These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math...
unlimited object storage image
Result Page: 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy