|
|
|
|
Glow Discharge Plasmas in Analytical Spectroscopy
This multi-author, edited volume includes chapters which deal with both basic and highly complex applications. Glow discharge devices are now being used in very novel ways for the analysis of liquids and gases, including molecular species detection and identification, an area that was beyond the perceived scope of applicability just ten years... | | Community Building on the Web : Secret Strategies for Successful Online CommunitiesThere's been a marked shift in the philosophy of developing successful Web sites. The technologies (HTML, JavaScript, JavaServer Pages) no longer occupy center stage. Rather, functional objectives and the communities that grow up around them seem to be the main ingredient in Web site success. In her carefully reasoned and well-written Community... | | Testing Code Security
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and... |
|
|
Engineering and Managing Software RequirementsRequirements engineering is the process by which the requirements for software systems are gathered, analyzed, documented, and managed throughout their complete lifecycle. Traditionally it has been concerned with technical goals for, functions of, and constraints on software systems. Aurum and Wohlin, however, argue that it is no longer appropriate... | | The Executive's Role in Knowledge ManagementThis book can act as a guide for those who grasp the potential of their organizations' knowledge assets and want to develop strategies for leveraging them.
The absolute, most critical success factor in knowledge management (KM) success is senior-level support. With a bottom-line perspective, The Executive’s role in Knowledge... | | Introduction to CryptographyDue to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.
In the first part, this book covers the key concepts of cryptography on... |
|
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 |