|
|
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... | | Deflation: What Happens When Prices Fall
MAY 6, 2003, WAS AN EXTRAORDINARY DAY IN
Washington, D.C. The Federal Reserve held its
Federal Open Market Committee (FOMC)
meeting in its two-storied chandeliered boardroom
at the central bank's white marble temple on
Constitution Avenue. Now, there was nothing
unusual about the FOMC gathering. The committee meets... | | |
|
The Hoover Dam (Building America: Then and Now)
The time was the early 1930s, the president was Herbert
Hoover, and the situation in the United States looked bleak.
The stock market had crashed in 1929, and most Americans were
hurt by the Great Depression, which left a majority of them jobless,
homeless, and penniless. But in the West, a beacon of hope
was in the... | | Handbook of Chemical Technology and Pollution Control, 3rd Edition, Third Edition
The objectives of the second edition have been maintained and updated to 2005 in the current volume where users will find that one third of the references, now totaling more than 1300, are new to this edition. At the same time most of the in-depth Further Reading suggestions are new to this volume, and production data of some 30 tables... | | Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security
systems. In remote access systems, speaker utterances are recoded and
communicated through a communication channel to a receiver that performs the
identification process. Speaker identification is based on characterizing each
speaker with a set of features... |
|
|
|
Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 |