|
|
|
|
|
| | Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... | | Discrete Mathematics (4th Edition)
Today an increasing proportion of the applications of mathematics involves discrete rather than continuous models. The main reason for this trend is the integration of the computer into more and more of modem society. This book is intended for a one-semester introductory course in discrete mathematics.
Prerequisites Even though a... |
|
|
| | America and Iran: A History, 1720 to the Present
An important, urgently needed book--a hugely ambitious, illuminating portrait of the two-centuries-long entwined histories of Iran and America, and the first book to examine, in all its aspects, the rich and fraught relations between these two powers--once allies, now adversaries. By an admired historian and the author of Untapped:... | | Domain Architectures : Models and Architectures for UML ApplicationsThe last two decennia have witnessed many advances in the area of software development. The advent of object-oriented programming languages and modelling languages such as Unified Modeling Language (UML) has increased our ability as developers to design and realize large and enterprise-wide software systems. However, software... |
|
|
Result Page: 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 |