Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

CMMI for Development: Implementation Guide
CMMI for Development: Implementation Guide

Apply best practices and proven methods to ensure a successful CMMi implementation. This practical book shows you which implementation hurdles to avoid and which CMMi best practices to apply in your work areas. You'll experience how easy the CMMi practice description is and how quickly and efficiently it can be implemented into...

Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Does the gunshot residue reveal how far from the target a weapon was fired? Is there any trace evidence to prove the accused handled a specific firearm? What is the likely behaviour of a ricocheting bullet? Do the marks on a bullet prove categorically that it was fired from a particular weapon? These are all issues (amongst others) that the fully...
Aspects of Explosives Detection
Aspects of Explosives Detection
Detection and quantification of trace chemicals is a major thrust of analytical chemistry. In recent years much effort has been spent developing detection systems for priority pollutants. Less mature are the detections of substances of interest to law enforcement and security personnel:in particular explosives. This volume will discuss the...
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Applications of Information Systems to Homeland Security And Defense
Applications of Information Systems to Homeland Security And Defense
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...
Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
The Aerospace and Defence industry has been at the forefront of systems engineering for many decades. The imperatives of commercial success and / or military need have compelled those in the Industry to seize the opportunities offered by taking a systems engineering approach to solve a variety of complex problems.

The insights offered by
...
Liberty, Games and Contracts
Liberty, Games and Contracts

Jan Narveson is one of the most significant contemporary defenders of the libertarian political position. Unlike other libertarians who typically defend their view with reference to natural rights or an appeal to utilitarianism, Narveson's main contribution has been to offer a philosophical defence of libertarianism based on a Hobbesian...

Barth, Origen, and Universal Salvation: Restoring Particularity
Barth, Origen, and Universal Salvation: Restoring Particularity
Barth, Origen, and Universal Salvation offers a bold new presentation of universal salvation. Building constructively from the third- century theologian, Origen, and the twentieth-century Swiss theologian, Karl Barth, Tom Greggs offers a defence of universalism as rooted in Christian theology, showing this belief does not have to be at the expense...
Free Radicals in Biology and Medicine
Free Radicals in Biology and Medicine

Free Radicals in Biology and Medicine has become a classic text in the field of free radical and antioxidant research. Now in its fifth edition, the book has been comprehensively rewritten and updated whilst maintaining the clarity of its predecessors. Two new chapters discuss 'in vivo' and 'dietary' antioxidants, the first...

Warfare and Weaponry in Dynastic Egypt
Warfare and Weaponry in Dynastic Egypt

Defence. Attack. Symbolism. The development of warfare in any society provides an evocative glance into the lives (and deaths) of our predecessors. This is never more the case than with that most enticing of ancient civilizations, Ancient Egypt. Follow Rebecca Dean through the fascinating world of mysterious figures such as...

Result Page: 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy