|
|
|
|
Cryptographic Security Architecture: Design and VerificationThis book describes various aspects of cryptographic security architecture design, with a particular emphasis on the use of rigorous security models and practices in the design. The first portion of the book presents the overall architectural basis for the design, providing a general overview of features such as the object model and... | | Programming the iPhone User ExperienceApple's iPhone and iPod Touch not only feature the world's most powerful mobile operating system, they also usher in a new standard of human-computer interaction through gestural interfaces and multi-touch navigation. This book provides you with a hands-on, example-driven tour of UIKit, Apple's user interface toolkit, and includes common design... | | |
|
Doing Research in the Real World"If you are interested in a balanced overview of both quantitative and qualitative research methods, if you are considering doing research at work or as a student, or if you are looking for a contemporary book on how research can be done in business settings, David Gray's Doing research in the real world would be an excellent... | | | | Information Flow and Knowledge Sharing, Volume 2 (Capturing Intelligence)Our goal in this book is to present our conceptualization of information and of knowledge, and to clarify the distinctions between these two concepts. Indeed, they are more than concepts. These two words convey a plurality of meanings and have a deep character that goes beyond pure conceptualizations. By emphasizing their distinctions, we do not... |
|
|
Programming the Perl DBIThe DBI is the standard database interface for the Perl programming language. The DBI is databaseindependent, which means that it can work with just about any database, such as Oracle, Sybase, Informix, Access, MySQL, etc.
While we assume that readers of this book have some experience with Perl, we don't assume much familiarity with... | | | | Guide to Computer Network Security (Computer Communications and Networks)Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to... |
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |