Home | Amazing | Today | Tags | Publishers | Years | Search 
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
Dissemination of Information in Optical Networks:: From Technology to Algorithms (Texts in Theoretical Computer Science. An EATCS Series)
Dissemination of Information in Optical Networks:: From Technology to Algorithms (Texts in Theoretical Computer Science. An EATCS Series)
Optical networks and the related technologies, network management software and services have undergone remarkable developments, and such networks are now the ultra-high-speed backbone networks for communication. Wavelength-Division Multiplexing (WDM), the ability to support multiple communication pathways over the same fiber, enables efficient use...
Switch-Mode Power Supply Simulation: Designing with SPICE 3 (McGraw-Hill Electronic Engineering)
Switch-Mode Power Supply Simulation: Designing with SPICE 3 (McGraw-Hill Electronic Engineering)
A MASTER CLASS IN POWER SUPPLY DESIGN THROUGH CIRCUIT SIMULATION
  • PSpice AND SPICE 3 models
  • Selected examples from the book
  • Getting started with Converter Design and Analysis
  • Solving Convergence Problems
  • CD with OrCAD/PSpice Examples

With...

Fundamental Approaches to Software Engineering
Fundamental Approaches to Software Engineering
This book constitutes the refereed proceedings of the 7th International Conference on Fundamental Approaches to Software Engineering, FASE 2004, held in Barcelona, Spain, in March/April 2004.

The 22 revised full papers and 4 tool presentation papers presented together with an invited paper and the abstract of another invited talk were carefully...

Building Trustworthy Semantic Webs
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. However, this improved accessibility poses a greater threat of unauthorized access, which could lead to the malicious corruption of...
MCTS Windows Vista Client Configuration Study Guide (Exam 70-620) (Study Guide & CD)
MCTS Windows Vista Client Configuration Study Guide (Exam 70-620) (Study Guide & CD)
Windows Vista is the latest iteration of the Windows product, bringing a number of new features to the Windows operating system and to the Windows networking. This book is designed to help you learn all about Windows Vista in preparation for Exam 70-620, Configuring Microsoft Windows Vista Client. The Windows Vista MCTS exam tests your ability to...
Creating Web-based Laboratories (Advanced Information and Knowledge Processing)
Creating Web-based Laboratories (Advanced Information and Knowledge Processing)
Remote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video camera & microphone before the equipment and apparatus to capture what is actually happening in the...
Architecture of a Database System
Architecture of a Database System
Database Management Systems (DBMSs) are a ubiquitous and critical component of modern computing, and the result of decades of research and development in both academia and industry. Architecture of a Database System presents an architectural discussion of DBMS design principles, including process models, parallel architecture, storage system...
Software Reuse: Methods, Techniques, and Tools: 8th International Conference, ICSR 2004, Madrid, Spain, July 5-9, 2004, Proceedings
Software Reuse: Methods, Techniques, and Tools: 8th International Conference, ICSR 2004, Madrid, Spain, July 5-9, 2004, Proceedings
After three decades of research and practice, reuse of existing software artefacts remains the most promising approach to decreasing effort for software development and evolution, increasing quality of software artefacts and decreasing time to market of software products. Over time, we have seen impressive improvements, in extra-organizational...
Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
Sarbanes-Oxley IT Compliance Using Open Source Tools-Second Edition, Second Edition
The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals,...
Digital Logic Design, Fourth Edition
Digital Logic Design, Fourth Edition
Brian Holdsworth's Digital Logic Design is a well established undergraduate text on digital systems - offering full coverage of the field for first and second year modules and HND units. It has also proved popular in industry as a reference text.

Clive Woods has fully revised the text to cover all the latest developments in the field
...
OSWorkflow: A guide for Java developers and architects to integrating open-source Business Process Management
OSWorkflow: A guide for Java developers and architects to integrating open-source Business Process Management
This book covers all aspects of OSWorkflow for Java developers and system architects, from basics of Business Process Management and installing OSWorkflow to developing complex Java applications and integrating this open-source Java workflow engine with the third-party components Drools for business rules, Quartz for task scheduling, and Pentaho...
Result Page: 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy