Welcome to the era of software reuse! Microsoft Enterprise Library helps accelerate development by providing reusable components and guidance on proven practices. If you build applications that run on the Microsoft .NET Framework, whether they are enterprise-level business applications or even relatively modest Windows® Forms,...
The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...
Why do contemporary economists consider food subsidies in starving countries, rent control in rich cities, and health insurance everywhere "inefficient"? Why do they feel that corporate executives deserve no less than their multimillion-dollar "compensation" packages and workers no more than their meager wages? Here is a...
An Integrated Technology for Delivering Better Software—Cheaper and Faster!
This book presents an integrated technology, Design for Trustworthy Software (DFTS), to address software quality issues upstream such that the goal of software...
"An excellent primer for futures and the global financial market, a clear voice of their importance for all traders. Tom also gives an easy-to-understand professional approach to discipline, money management, and the 'numbers' to watch that indicate market direction. Help for...
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.
Overview
Understand Android security from kernel to the application layer
All too often, a simple lack of understanding of fundamental business concepts is enough to prevent capable scientists and engineers from receiving otherwise deserved promotions. These days, technical merit and hard work alone no longer guarantee upward mobility. For scientists and engineers with aspirations of moving up the corporate ladder...
In this essential guide, Dave Visel draws on expertise hard-won during his wife’s battle with lymphoma. He provides an overview of the varieties of cancer and all the basic types of treatments available. Chapters dispel common myths associated with these treatments...
The time is absolutely ripe for this handbookThere is no single source of information that has this breadth todayFinally, there is an examination of the Internet as a holistic system. Topics of privacy, trust, policy, and law are addressed as well as the structure of the Internet and of the Web. Stuart Feldman, Vice President, Internet...
From an empirical as well as a personal point of view, risk management in the financial industry has been one of the most exciting and most researched areas over the last decade. Depositors and regulators claim that risk management is necessary, and many banks argue that superior risk management can create (shareholder) value. However, from a...
WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.
For more than a year, I had been grappling with an onslaught of urgent but...
This book critically examines the practice and meanings of corporate social responsibility (CSR) and how the movement has facilitated a positive and somewhat unquestioned image of the global corporation. Drawing on extensive fieldwork material collected in Ghanaian communities located around the project sites of Newmont Mining...