|
|
|
|
|
Cryptographic Security Architecture: Design and VerificationThis book describes various aspects of cryptographic security architecture design, with a particular emphasis on the use of rigorous security models and practices in the design. The first portion of the book presents the overall architectural basis for the design, providing a general overview of features such as the object model and... | | The Definitive Guide to SOA: Oracle® Service Bus, Second EditionThe Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects who know enterprise development but are new to enterprise service buses (ESBs) and service–oriented architecture (SOA) development. This is the first book to cover a practical approach to SOA using the BEA... | | Managerial Leadership
I remember talking in 1995 with Bob Staton, CEO of Colonial Life
& Accident Insurance Company, a division of UNUM, about the
lack of leadership throughout the company. Colonial was one of
the few large, homegrown companies in Columbia, South Carolina,
when it was acquired by UNUM, the Maine-based disability insurance... |
|
Optimization and Security Challenges in Smart Power Grids (Energy Systems)
This book provides an overview of state-of-the-art research on “Systems and Optimization Aspects of Smart Grid Challenges.” The authors have compiled and integrated different aspects of applied systems optimization research to smart grids, and also describe some of its critical challenges and requirements.
The promise... | | Communicating Data with Tableau
Go beyond spreadsheets and tables and design a data presentation that really makes an impact. This practical guide shows you how to use Tableau Software to convert raw data into compelling data visualizations that provide insight or allow viewers to explore the data for themselves.
Ideal for analysts, engineers,... | | Network Attacks and Exploitation: A Framework
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate... |
|
|
|
Result Page: 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 |