|
|
|
|
|
| | Security in E-Learning (Advances in Information Security)As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk... | | Sukhoi Su-27: Famous Russian AircraftIn the late 1960s, the Soviet Union became aware that the U.S. was developing a new generation of jet fighters that had an exceptional range, heavy armor, and great agility in the air. These U.S. aircraft, the F-14 Tomcat, F-15 Eagle, F-16 Fighting Hornet, and F/A-18 Hornet dominated U.S. air power for three decades. In the context of the Cold War,... |
|
|
Chemical Mechanical Polishing in Silicon Processing, Volume 63
In the engineering world, many ideas and plans are conceived in the
information exchanges that occur over lunch. In the summer of 1997, one of
the editors (Shin Hwa Li) was assigned to assist our CMP module at the
Crolles facility of STMicroelectronics near Grenoble, France. One day, in
the company cafeteria, while sitting near... | | Android Cookbook
Jump in and build working Android apps with the help of more than 200 tested recipes. With this cookbook, you’ll find solutions for working with the user interfaces, multitouch gestures, location awareness, web services, and device features such as the phone, camera, and accelerometer. You also get useful steps on packaging... | | Foundations of Computer SecurityAnyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |