Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Bioinformatics Technologies
Bioinformatics Technologies
Solving modern biological problems requires advanced computational methods. Bioinformatics evolved from the active interaction of two fast-developing disciplines, biology and information technology. The central issue of this emerging field is the transformation of often distributed and unstructured biological data into meaningful information....
Programming Scala: Tackle Multi-Core Complexity on the Java Virtual Machine (Pragmatic Programmers)
Programming Scala: Tackle Multi-Core Complexity on the Java Virtual Machine (Pragmatic Programmers)
The increasing popularity and availability of multicore processors is creating a whole new set of challenges--although you can enjoy true concurrency, you're now faced with higher contention and synchronization issues. Deploying an existing application on a multicore processor may bring out previously hidden concurrency issues. Java's...
Data Warehousing: Architecture and Implementation
Data Warehousing: Architecture and Implementation
A start-to-finish process for deploying successful data warehouses.

This book delivers what every data warehousing project participant needs most: a thorough overview of today's best solutions, and a reliable step-by-step process for building warehouses that meet their objectives. It answers the key questions asked by everyone involved in a...

The RF in RFID: Passive UHF RFID in Practice
The RF in RFID: Passive UHF RFID in Practice
This book includes a survey of all RFID fundamentals and practices in the first part of the book while the second part focuses on UHF passive technology. This coverage of UHF technology and its components including tags, readers, and antennas is essential to commercial implementation in supply chain logistics and security.

Reaaders of
...
Essential Issues in SOC Design: Designing Complex Systems-on-Chip
Essential Issues in SOC Design: Designing Complex Systems-on-Chip

This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.

SOC design is fast becoming the key...

The Black Death (Great Historic Disasters)
The Black Death (Great Historic Disasters)
In 1346, Europe was hit by the worst natural disaster in its recorded history: the Black Death. Generally believed to be a combination of bubonic plague and two other plague strains, the Black Death ravaged the length and breadth of Europe from Sicily to Norway, from Ireland to Russia, for five terrible years. Scholars can...
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific
Design and Usability of Digital Libraries: Case Studies in the Asia Pacific

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific showcases some of the best digital library practices from organizations in the Asia Pacific. Particular emphasis has been placed on the design, use and usability of digital libraries. Not only are digital libraries examined, but related technologies, the management of...

Direct-Write Technologies for Rapid Prototyping Applications: Sensors, Electronics, and Integrated Power Sources
Direct-Write Technologies for Rapid Prototyping Applications: Sensors, Electronics, and Integrated Power Sources

Direct-Write Technologies covers applications, materials, and the techniques in using direct-write technologies. This book provides an overview of the different direct write techniques currently available, as well as a comparison between the strengths and special attributes for each of the techniques. The techniques described open the...

The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
Sit down at the keyboard and cinch that deal! Press the send button and get the account!

Writing skills are more important than ever in determining business success. They can make the difference between climbing the corporate ladder and getting stuck on a low rung. An e-mail that's clear, concise, and targeted will get more than just a...

The Truth About Being a Leader
The Truth About Being a Leader

Praise for The Truth About Being a Leader

“If you ever met Dr. Otazo, you certainly would read her new Truth book. She is as she writes—engaging, pithy, memorable. Take ‘Truth 33: Questions Unite; Answers Divide.’ Now ain’t that the truth....

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy