As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.
This volume is published under the auspices of the World Federation of Societies of Intensive Care Medicine, which consists of 48 members societies (both medical and nursing) - a truly world wide organisation - and whose aim is to promote excellence in the care of critically ill patients. The volume will be distributed to delegates on...
IT Innovation for Adaptability and Competitiveness addresses the topic of IT innovations that can further an organization's ability to adapt and be competitive. Thus we address the problem at an earlier starting point, that is, the emergence of something innovative in an organization, applied to that organization, and its process of being...
This text is designed to be used with an introductory course in database management.
Such a course is usually required as part of an information systems curriculum in
business schools, computer technology programs, and applied computer science
departments. The Association for Information Systems (AIS), the Association...
Many active amateur astronomers today, having already surveyed the clusters,
nebulae, and galaxies contained in the popular Messier and Caldwell catalogs, are
seeking new horizons to explore with their telescopes. None better can possibly be
found than those discoveries made by the great English astronomer Sir William
Herschel in...
Knowing a reliable enterprise messaging system based on the AMQP standard can be an essential for today’s software developers. This cookbook helps you learn all the basics of RabbitMQ through recipes, code, and real-life examples.
Overview
Create scalable distributed applications with RabbitMQ
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical...
This is the first part in a two-volume work on neuromodulation. It describes techniques and procedures applied in internal contact with non-neural tissues surrounding the nervous system (dura or cerebrospinal fluid), as in the case of epidural stimulation for pain or intrathecal drug application for the treatment of spasticity and pain. In...
This book presents the latest worldwide results in theory and practice of formal techniques for networked and distributed systems. The theme of the book is addressed by specialized papers in the following areas:
Recent years have seen enormous advances in the technology of concrete as a material, through which its strength, compactness and ductility can reach levels never dreamed of before. Thanks to these improved material properties, the strength and durability of concrete structures is greatly improved, their weight and dimensions reduced, the...
Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.
The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.