Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Craftsmanship: The New Imperative
Software Craftsmanship: The New Imperative

By recognizing that software development is not a mechanical task, you can create better applications.

Today’s software development projects are often based on the traditional software engineering model, which was created to develop large-scale defense projects. Projects that use this antiquated industrial model tend to take...

International Security and the United States: An Encyclopedia (Praeger Security International)
International Security and the United States: An Encyclopedia (Praeger Security International)

Shaped by often very dramatic events, international security and the international system have changed significantly in recent years. The conclusion of the Cold War, the emergence of new political systems, the growth of significant threats such as terrorism, and the development of new security doctrines have driven global transformation. These...

Seeing Dark Things: The Philosophy of Shadows
Seeing Dark Things: The Philosophy of Shadows
If a spinning disk casts a round shadow does this shadow also spin? When you experience the total blackness of a cave, are you seeing in the dark? Or are you merely failing to see anything (just like your blind companion)?

Seeing Dark Things uses visual riddles to explore our ability to see shadows, silhouettes, and black birds--plus
...
GFI Network Security and PCI Compliance Power Tools
GFI Network Security and PCI Compliance Power Tools
Use GFI's Tools to Search for Vulnerabilities in Your Network!

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.
...
Inside the Spam Cartel
Inside the Spam Cartel

Since the explosion of Internet users during the late 1990’s, the unending spam scourge has shown no sign of abating. Statistics from large anti-spam companies that monitor millions of e-mails per hour show that the rates are actually still going up, and depending who you listen to, they are now rising between 50 and...

Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Georg Cantor
Georg Cantor
One of the greatest revolutions in mathematics occurred when Georg Cantor (1845-1918) promulgated his theory of transfinite sets. This revolution is the subject of Joseph Dauben's important studythe most thorough yet writtenof the philosopher and mathematician who was once called a "corrupter of youth" for an innovation that is now a...
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Forensic Science: An Illustrated Dictionary
Forensic Science: An Illustrated Dictionary
The text is deserving of inclusion in the library of a crime laboratory, if not in the personal library of lab personnel.
- Scientific Sleuthing Review, Summer 2004

This volume introduces the laboratory terms that are crucial to the interpretation and understanding of laboratory report findings. The definitions and accompanying...

Security for Telecommunications Networks (Advances in Information Security)
Security for Telecommunications Networks (Advances in Information Security)
Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them. Given the significant focus on securing critical infrastructure in recent years,...
CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition
CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition

Capability Maturity Model IntegrationSM (CMMI) has rapidly become a preferred means of improving organizational processes in industry and government. Building on a decade of work with process improvement models, including the Capability Maturity Model® (CMM®) for Software and the Systems Engineering Capability Model, a team of over two...

The Best Enemy Money Can Buy
The Best Enemy Money Can Buy
Back in 1973 this author published National Suicide: Military Aid to the Soviet Union, itself a sequel to a three volume academic study, Western Technology and Soviet Economic Development, published by the Hoover Institution, Stanford University. These four books are detailed verifiable catalogs of Western technology used and in use by the Soviet...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy