|
|
|
|
Information Security Management Handbook, Fifth Edition, Volume 3Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and... | | | | Immunological Computation: Theory and ApplicationsOver the last decade, the field of immunological computation has progressed slowly and steadily as a branch of computational intelligence. Immunological Computation: Theory and Applications presents up-to-date immunity-based computational techniques. After a brief review of fundamental immunology concepts, the book presents computational models... |
|
|
|
Process Improvement and CMMI® for Systems and Software
Presenting the state of the art in strategic planning and process improvement, Process Improvement and CMMI® for Systems and Software provides a workable approach for achieving cost-effective process improvements for systems and software. Focusing on planning, implementation, and management in system and... | | The ABCs of IP AddressingOur world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to... | | Computer Telephony Integration, Second EditionSince the publication of the first edition, the CTI world has changed significantly. Where it was once focused on the integration of voice systems with computers, the focus is now on IP-based voice, or converged networks and services. Today, the telcos are upgrading their systems from circuit-switched to IP-based packet-switched networks. Companies... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |