 |
|
|
 |  |  Weight Training For Dummies (Health & Fitness)When the first edition of Weight Training For Dummies was published, lifting weights was on the verge of becoming a mainstream phenomenon. Women, Baby Boomers, seniors — all these groups were starting to get the message: Hoisting hunks of iron benefits everyone, not just bodybuilders with shoulders wider than the wingspan of a DC-10.
... |  |  Grid Computing: Software Environments and ToolsGrid computing combines aspects from parallel computing, distributed computing and data management, and has been playing an important role in pushing forward the state-of-the-art in computer science and information technologies. There is considerable interest in Grid computing at present, with a significant number of Grid projects being launched... |
|
 Grid Computing SecurityGrid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and... |  |  Conceptual Modeling of Information SystemsWhen designing an information system, conceptual modeling is the activity that elicits and describes the general knowledge the system needs to know. This description, called the conceptual schema, is necessary in order to develop an information system. Recently, many researchers and professionals share a vision in which the conceptual schema... |  |  Effective IT Service Management: To ITIL and Beyond!IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, every IT project and system would deteriorate over time until failure. ITIL is the recognized best-practice standard for ITSM, and has been around since the late 1980s, with ITIL version 3 published just recently. However, many... |
|
 Secure Data Management in Decentralized Systems (Advances in Information Security)The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business... |  |  Essential RenderMan®When I wrote Essential RenderMan fast in 2002 it didn’t seem that I was writing about a moving target. The RenderMan API is a standard, and hence doesn’t change radically from release to release. However, once you start writing things down they seem to change far more quickly than you expect.
No sooner had the book gone to... |  |  Forensic Computing (Practitioner)Throughout this book you will find that we have consistently referred to the term “Forensic Computing” for what is often elsewhere called “Computer Forensics”. In the UK, however,when we first started up, the name “Computer Forensics” had been registered to a commercial company that was operating in this field... |
|
Result Page: 2328 2327 2326 2325 2324 2323 2322 2321 2320 2319 2318 2317 2316 2315 2314 2313 2312 2311 2310 |