|
|
|
|
The Government Machine: A Revolutionary History of the ComputerSitting in the reading rooms of the Public Record Office in London, a historian is in the center of a museum of organization. Copies of the catalogue to the museum fill several walls (although these are now complemented by online versions). The catalogue lists are dominated by references to objects of one kind: the file. The file has in its... | | Network Security Assessment: Know Your NetworkHow secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this... | | |
|
The Law and Economics of Cybersecurity
Cybersecurity is a leading national problem for which the market may fail to produce a solution because individuals often select less than optimal security levels in a world of positive transaction costs. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition... | | Ecological Modeling for Resource Management
This book was developed from a workshop on the “Effective Use of
Ecological Modeling in Management,” held in Oak Ridge, Tennessee,
on October 23–26, 2000. The workshop was sponsored by the Department
of Defense’s (DoD’s) Strategic Environmental Research and Development
Program (SERDP), the Army Research... | | Drupal 7 Multilingual Sites
Recent estimates show at least 1.5 million websites run on Drupal, which calculates
to roughly two percent of all sites. Drupal is used to create personal, business,
government, and educational websites including high-profile ones such as
whitehouse.gov, duke.edu, and economist.com. Drupal adoption is following
a very positive... |
|
|
|
|
Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 |