Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... | | Peer to Peer Computing: The Evolution of a Disruptive TechnologyPeer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to... | | Global Positioning Systems, Inertial Navigation, and IntegrationAn updated guide to GNSS and INS, and solutions to real-world GPS/INS problems with Kalman filtering
Written by recognized authorities in the field, this second edition of a landmark work provides engineers, computer scientists, and others with a working familiarity with the theory and contemporary... |