Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
For many years, major software companies like Microsoft and Oracle made previously unfathomable profits by selling enterprise software that companies would buy and operate in their own data centers. In the last 20 years, we have seen a gradual transition to a wide variety of software and services models – SaaS, IaaS, PaaS...
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

CMMI® SCAMPI Distilled Appraisals for Process Improvement
CMMI® SCAMPI Distilled Appraisals for Process Improvement

The Standard CMMI Appraisal Method for Process Improvement (SCAMPI) is an invaluable tool for organizations seeking to drive quantifiable improvements in systems and software engineering. SCAMPI appraisals can help those organizations identify the strengths and weaknesses of their current processes, reveal crucial development...

Cryptography in C and C++
Cryptography in C and C++
  • Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
  • Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
  • Not toy code(tm), but a practical treatment of modern cryptographic...
Leading Transformative Change Collectively
Leading Transformative Change Collectively

This book directly helps decision-makers and change agents in companies, NGOs, and government bodies become more proficient in transformative, collaborative change in realizing the SDGs.

This practitioner’s handbook translates a systemic – and enlivening – approach to collaboration into day-to-day work...

The Story of Silver: How the White Metal Shaped America and the Modern World
The Story of Silver: How the White Metal Shaped America and the Modern World

How silver influenced two hundred years of world history, and why it matters today

This is the story of silver’s transformation from soft money during the nineteenth century to hard asset today, and how manipulations of the white metal by American president Franklin D. Roosevelt during the 1930s and by
...

Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary form as early as the 1960’s, AR is only now becoming truly practical. Recent advances in mobile processing, coupled with an explosion in digital storage capacity, ubiquity of wireless broadband connections, mass adoption of smart phones, and...
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Computer Privacy Annoyances
Computer Privacy Annoyances

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Software Architecture in Practice, Second Edition
Software Architecture in Practice, Second Edition

This award-winning book, substantially updated to reflect the latest developments in the field, introduces the concepts and best practices of software architecture-how a software system is structured and how that system's elements are meant to interact. Distinct from the details of implementation, algorithm, and data...

unlimited object storage image
Result Page: 86 85 84 83 82 81 80 79 78 77 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy