Home | Amazing | Today | Tags | Publishers | Years | Search 
Insider Threats in Cyber Security (Advances in Information Security)
Insider Threats in Cyber Security (Advances in Information Security)

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book...

Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011
Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011

Rapid development of new technologies is leading to ever more versatile, multipurpose mobile devices, including 3G and 4G Internet-enabled cell phones. Wireless networking and wireless Internet access are developing and expanding on a global basis at a rapid rate. Meanwhile, RFID (radio frequency identification) will revolutionize wireless...

Psych Yourself Rich: Get the Mindset and Discipline You Need to Build Your Financial Life
Psych Yourself Rich: Get the Mindset and Discipline You Need to Build Your Financial Life

The arrival of this book and its message, I suspect, could not have been better timed. We’re more than two years into this great recession, and many of us are more confused than ever about our personal finances. With the financial and employment landscapes evolving before us, it’s difficult to return to the old, prescriptive...

Oracle E-Business Suite 12 Financials Cookbook
Oracle E-Business Suite 12 Financials Cookbook

Oracle E-Business Suite 12 Financials is a solution that provides out-of-the-box features to meet global financial reporting and tax requirements with one accounting, tax, banking, and payments model, and makes it easy to operate shared services across businesses and regions. You may have read what EBS Financials does, but with this book on...

Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software Engineering Series)
Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software Engineering Series)
This book is about programming-in-the-large, a term coined by DeRemer and Kron [2] to distinguish the assembly of large applications from components, from the task of implementing those components themselves. Many of the principles of programming-in-the-large were earlier elucidated by Parnas in two articles [3, 4]. It is...
Oracle Database Performance and Scalability: A Quantitative Approach
Oracle Database Performance and Scalability: A Quantitative Approach

This book stemmed from the author’s other book—Software Performance and Scalability: a Quantitative Approach, published by Wiley in 2009. That book helps

readers grasp the basic concepts, principles, methodologies, best practices, queueing theories, and profiling tools associated with optimizing software performance and...

Windows Azure Platform
Windows Azure Platform
In the past couple of years, cloud computing has emerged as a disruptive force in the information technology (IT) industry. Its impact is of the same magnitude as the Internet and offshoring. Gartner Research has identified cloud computing as one of the “top 10 disruptive technologies 2008–2012.” According to...
Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)
Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)

Since the World Wide Web became widely available in the mid 1990s, Web-based applications have developed rapidly. The Web has come to be used by a range of people for many different purposes, including online banking, e-commerce, distance education, social networking, data sharing, collaborating on team projects, and...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Experience and Knowledge Management in Software Engineering
Experience and Knowledge Management in Software Engineering

Nowadays, there is software everywhere in our life. It controls cars, airplanes, factories, medical implants. Without software, banking, logistics and transportation, media, and even scientific research would not function in the accustomed way. Building and maintaining software is a knowledge-intensive endeavour and requires that specific...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy