|
|
|
|
Early Hip Disorders: Advances in Detection and Minimally Invasive Treatment
As one of the leading specialists in hip arthroscopies, Dr. Joseph McCarthy's text promises to become a definitive addition to the field. Featuring full color, arthroscopic views and contributions from prestigious figures in the orthopaedic community, this text covers all the essentials of hip arthroscopy including: examiniations,... | | An Implementation Guide to Compiler Writing
An important aspect of teaching a course in compiler writing is to illustrate
the key theoretical concepts normally taught in such a course. A frequently used
strategy for achieving this goal is to have a student design a simple programming
language and implement a compiler for this language. Many texts in compiler
writing do not,... | | Information Security: Principles and Practice
Now updated—your expert guide to twenty-first century information security
Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data.... |
|
|
Concurrent and Distributed Computing in JavaAn in-depth introduction to concurrent and distributed computing with Java
Combining the two key types of Java programming, Concurrent and Distributed Computing in Java offers both professionals and students a comprehensive guide to fundamental concepts necessary for mastering Java programming.
The text is presented in... | | Mainframe Basics for Security Professionals: Getting Started with RACFSecurity—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers... | | Network Security Through Data Analysis: From Data to Action
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll... |
|
|
|
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 |