|
|
|
|
Enterprise Java 2 Security: Building Secure and Robust J2EE Applications The purpose of this book is to illustrate the applicability of Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security technologies in building a secure enterprise infrastructure containing Java-based enterprise applications. With a pragmatic approach, the book explains why Java security... | | | | Machine Learning in Medicine
Machine learning is a novel discipline concerned with the analysis of large and multiple variables data. It involves computationally intensive methods, like factor analysis, cluster analysis, and discriminant analysis. It is currently mainly the domain of computer scientists, and is already commonly used in social sciences, marketing... |
|
|
The Best Enemy Money Can BuyBack in 1973 this author published National Suicide: Military Aid to the Soviet Union, itself a sequel to a three volume academic study, Western Technology and Soviet Economic Development, published by the Hoover Institution, Stanford University. These four books are detailed verifiable catalogs of Western technology used and in use by the Soviet... | | | | |
|
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |