|
|
|
|
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes... | | The Mac Hacker's HandbookAs more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat... | | Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)From August 27 to 31, 2000, the International Conference and Research Center for Computer Science in Schloss Dagstuhl, Dagstuhl for short, celebrated its 10th anniversary. Since its founding in 1990, the objective of the Center has been to promote world-class research in computer science, support leading-edge continuing education, and promote the... |
|
|
|
| | Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing... | | Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of... |
|
|
Result Page: 638 637 636 635 634 633 632 631 630 629 628 627 626 625 624 623 622 621 620 |