Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal...
Infective endocarditis is a life-threatening diseasewith substantial
morbidity and mortality (20% or more) despite
improved techniques to aid diagnosis and modern antibiotics
and surgical therapies. It affects individuals with
underlying structural cardiac defects who develop bacteremia,
often as a result of dental,...
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...
This 200 page revised edition of Microsoft Mapping includes the latest details about SQL Server 2014 and the new 3D and Streetside-capable map control for Windows 10 applications. It contains updated chapters on Microsoft Azure and Power Map for Excel plus a new chapter on Bing Maps for Universal Windows. The book tells a story, from...
Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...
Learn to deploy and support Hyper-V, building on what you know about VMware's vSphere. Whether you're looking to run both hypervisors in parallel or migrate completely, Hyper-V for VMware Administrators has everything you need to get started.
The book begins with an overview of Hyper-V basics, including common...
While flowing text around images is certainly nothing new, with CSS you can float any element, from images to paragraphs to lists. In this practical guide, author Eric Meyer reveals some interesting—and surprising—ways to use CSS floats in your web design, including the latest capability to flow content past...
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.
Overview
Understand Android security from kernel to the application layer