Home | Amazing | Today | Tags | Publishers | Years | Search 
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
A software testing survival guide to deliver winning Internet-based applications

Accessibility, reliability, availability, and security of Web applications on all types of platforms are key to winning business and customers. The technol-ogy continues to change at a fast pace, and savvy end-users are demanding products and services with fewer...

Handbook of Information Management
Handbook of Information Management
I am very pleased to introduce this new edition of the Handbook. Formerly entitled Handbook of Special Librarianship and Information Work, this represents the eighth edition of what is generally regarded as Aslib’s ‘flagship’ reference work, the seminal text on modern information theories, procedures and practices since 1955....
Spatial Interpolation for Climate Data: The Use of GIS in Climatology and Meterology
Spatial Interpolation for Climate Data: The Use of GIS in Climatology and Meterology
The COST 719 European research program (“The use of GIS in climatology and meteorology”) began in 2001 and ended in 2006. 20 European countries participated. Its main objective was to establish interfaces between GIS and data in climatology and meteorology and in order to reach this objective, three working groups were defined:
...
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
Ensure that your WAN can handle the latest technologies with this must-have strategy guide

If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and
...
The End of Software: Transforming Your Business for the On Demand Future
The End of Software: Transforming Your Business for the On Demand Future
Twenty-five years ago, the high-tech business was small, computers were largely relegated to accounting, and the money major corporations spent on information technology barely made a dent in their overall budgets. Today that has all changed. High-tech businesses are some of the largest in the world. The Dow Jones Industrial Average includes four...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
High Performance MySQL: Optimization, Backups, Replication, and More
High Performance MySQL: Optimization, Backups, Replication, and More
High Performance MySQL is the definitive guide to building fast, reliable systems with MySQL. Written by noted experts with years of real-world experience building very large systems, this book covers every aspect of MySQL performance in detail, and focuses on robustness, security, and data integrity. High Performance MySQL teaches you advanced...
Microsoft Exchange Server 2007 with SP1: Tony Redmond's Guide to Successful Implementation
Microsoft Exchange Server 2007 with SP1: Tony Redmond's Guide to Successful Implementation
Exchange 2007 represents the biggest advance in the history of Microsoft Exchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of hotfixes, security enhancements and additional functionality.

Tony
...
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Information Foraging Theory: Adaptive Interaction with Information (Oxford Series in Human-Technology Interaction)
Information Foraging Theory: Adaptive Interaction with Information (Oxford Series in Human-Technology Interaction)
Although much of the hubris and hyperbole surrounding the 1990's Internet has softened to a reasonable level, the inexorable momentum of information growth continues unabated. This wealth of information provides resources for adapting to the problems posed by our increasingly complex world, but the simple availability of more information does not...
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
The 6th Conference on Security and Cryptography for Networks (SCN 2008) was held in Amalfi, Italy, on September 10–12, 2008. The first four editions of the conference where held in Amalfi, while, two years ago, the fifth edition was held in the nearby Maiori. This year we moved back to the traditional location.

Security and privacy
...
Result Page: 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy