Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences
Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches,
world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,...
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.
On the other hand I've...
OpenCL Programming Guide
Industry pundits love drama. New products don’t build on the status quo
to make things better. They “revolutionize” or, better yet, define a “new
paradigm.” And, of course, given the way technology evolves, the results
rarely are as dramatic as the pundits make it seem.
Over the past decade,...
TIBCO Architecture Fundamentals (TIBCO Press)
TIBCO’s product suite comprises a diverse range of components. Each component is specialized for a particular functionality, ranging from basic messaging through services, service orchestration, the management of complex business processes, managing master data across...
Advanced Programming in the UNIX® Environment: Second Edition "Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
|Result Page: 86 85 84 83 82 81 80 79 78 77 |