 |
|
|
 Guide to Computer Network Security (Computer Communications and Networks)Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to... |  |  The Routledge Dictionary of Gods, Goddesses, Devils and DemonsThis dictionary covers, in one volume, over 1800 of the most important deities and demons from around the world. From classical Greek and Roman mythology to the gods of Eastern Europe and Mesopotamia, from Nordic giants to Islamic jinns and Egyptian monsters, it is packed with descriptions of the figures most worshipped and feared around the world... |  |  |
|
 Classical And Quantum Dissipative SystemsThis book discusses issues associated with the quantum mechanical formulation of dissipative systems. It begins with an introductory review of phenomenological damping forces, and the construction of the Lagrangian and Hamiltonian for the damped motion. It is shown, in addition to these methods, that classical dissipative forces can also be derived... |  |  Advances in Mathematical Modeling for ReliabilityAdvances in Mathematical Modeling for Reliability discusses fundamental issues on mathematical modeling in reliability theory and its applications. Beginning with an extensive discussion of graphical modeling and Bayesian networks, the focus shifts towards repairable systems: a discussion about how sensitive availability calculations parameter... |  |  Cocoon 2 Programming: Web Publishing with XML and JavaThanks to the tireless efforts of open-source developers, Cocoon has quickly gained visibility as the preeminent XML-based Web publishing framework. Unfortunately, its documentation remains a significant shortcoming. If you’re new to Cocoon, gaining a sense of exactly what you can do with it can be difficult, and actually... |
|
 The End of Software: Transforming Your Business for the On Demand FutureTwenty-five years ago, the high-tech business was small, computers were largely relegated to accounting, and the money major corporations spent on information technology barely made a dent in their overall budgets. Today that has all changed. High-tech businesses are some of the largest in the world. The Dow Jones Industrial Average includes four... |  |  |  |  Principles of Model CheckingOur growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twenty years is model checking, which systematically (and automatically) checks whether a model of a... |
|
Result Page: 7 6 5 4 3 2 1 |