Home | Amazing | Today | Tags | Publishers | Years | Search 
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Business Process Management Workshops: BPM 2010 International Workshops and Education Track
Business Process Management Workshops: BPM 2010 International Workshops and Education Track

Business process management (BPM) is an established research domain for computer science, information systems, and management scholars. The record number and wide scope of submissions to the eighth installation of the International Conference on Business Process Management was an indication of the vibrancy of the area and the varied...

Software Reliability Methods (Texts in Computer Science)
Software Reliability Methods (Texts in Computer Science)

This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software...

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Game Engine Gems, Volume One
Game Engine Gems, Volume One

In the fields of computer graphics and computer game development, the word gem has been established as a term for describing a short article that focuses on a particular technique, a clever trick, or practical advice that a person working in these fields would find interesting and useful....

Pro SharePoint 2010 Solution Development: Combining .NET, SharePoint, and Office
Pro SharePoint 2010 Solution Development: Combining .NET, SharePoint, and Office

This book takes a practical problem-solution approach to common business challenges. You’ll not only encounter interesting code samples, but also see how to combine these examples with the Microsoft collaboration platform’s services. The book’s solutions focus on using Visual Studio 2008 and its built-in Office development...

Pro SQL Server 2008 Analysis Services
Pro SQL Server 2008 Analysis Services

Every business has a reams of business data locked away in databases, business systems, and spreadsheets. While you may be able to build some reports by pulling a few of these repositories together, actually performing any kind of analysis on the data that runs your business can range from problematic to impossible. Pro SQL Server 2008...

Cool Thermodynamics: Engineering and Physics of Predictive, Diagnostic and Optimization Methods for Cooling Systems
Cool Thermodynamics: Engineering and Physics of Predictive, Diagnostic and Optimization Methods for Cooling Systems

This book is geared toward those interested in the engineering and physics of airconditioning and refrigeration devices (chillers). Analytic thermodynamic models are developed for a wide variety of cooling systems and a broad range of operating conditions. These models are easily implemented in the field or laboratory. Although the authors...

Handbook of Neurochemistry and Molecular Neurobiology: Neuroimmunology
Handbook of Neurochemistry and Molecular Neurobiology: Neuroimmunology

Neuroimmunology is one of the most rapidly developing branches of Neurobiology, prompted by novel neurochemical, neuroendocrinological, and neurophysiological investigations of the central and peripheral nervous system including neuroendocrine systems. Neuroimmunology can be considered as an interdisciplinary science that covers relevant...

Barcodes for Mobile Devices
Barcodes for Mobile Devices

From inventory management in stores to automotive part tracking in assembly plants, barcodes are one of the most prevalent automatic identification and data capture technologies. This book provides a complete introduction to barcodes for mobile devices, presenting the most relevant and up-to-date information previously unavailable elsewhere...

Google (Corporations That Changed the World)
Google (Corporations That Changed the World)

It's the American dream—start a company, make a fortune, and retire early. But to become multimillionaires in their twenties, as Google founders Larry Page and Sergey Brin did, boggles the mind. All they did, after all, is come up with a better way to search for things on the Internet, right? Only in part. No company achieves a...

Result Page: 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy