Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces...
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Reliability Engineering: Theory and Applications (Advanced Research in Reliability and System Assurance Engineering)
Reliability Engineering: Theory and Applications (Advanced Research in Reliability and System Assurance Engineering)

Reliability theory is a multidisciplinary science aimed at developing complex systems that are resistant to failures. Reliability engineering has emerged as a main field not only for scientists and researchers, but also for engineers and industrial managers. This book covers the recent developments in reliability engineering. It...

High-Assurance Design : Architecting Secure and Reliable Enterprise Applications
High-Assurance Design : Architecting Secure and Reliable Enterprise Applications

How to Design for Software Reliability, Security, and Maintainability

Many enterprises unfortunately depend on software that is insecure, unreliable, and fragile. They compensate by investing heavily in workarounds and maintenance, and by employing hordes of...

Expert Python Programming
Expert Python Programming

Expert Python Programming shows how Python development should be done with best practices and expert design tips. This book is for Python developers who are already building applications, but want to build better ones by applying best practices and new development techniques to their projects. The reader is expected to have a sound background...

QoS Over Heterogeneous Networks
QoS Over Heterogeneous Networks

The importance of quality of service (QoS) has risen with the recent evolution of telecommunication networks, which are characterised by a great heterogeneity. While many applications require a specific level of assurance from the network; communication networks are characterized by different service providers, transmission means and implementer...

Production of Plasma Proteins for Therapeutic Use
Production of Plasma Proteins for Therapeutic Use

Sets forth the state of the science and technology in plasma protein production

With contributions from an international team of eighty leading experts and pioneers in the field, Production of Plasma Proteins for Therapeutic Use presents a comprehensive overview of the current state of knowledge about the...

Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP...

Device Modeling for Analog and RF CMOS Circuit Design
Device Modeling for Analog and RF CMOS Circuit Design
In order to keep up with global demand, microelectronics engineers are continually challenged to produce increasingly complex, high performance integrated circuits. The steady downscaling of MOSFET/CMOS technology has highlighted the need for a thorough understanding of the properties, potentials and limitations of the latest device models and...
Electronics Process Technology: Production Modelling, Simulation and Optimisation
Electronics Process Technology: Production Modelling, Simulation and Optimisation
In electronics manufacture, the expanding range of products and the smaller-and-smaller scale of increasingly integrated components is producing a trend towards complex and fault-susceptible processes. This fact, coupled with shorter production times and the importance of quality assurance necessitates that process technology be more adaptable and...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy