Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security for Web Services and Service-Oriented Architectures
Security for Web Services and Service-Oriented Architectures

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this...

Soundtracks : Popular Music, Identity and Place
Soundtracks : Popular Music, Identity and Place
'This is a really good book, which I enjoyed immensely, and I am confident that it will becomea classic publication in its field. Indeed it contains so much material that it is probably impossible to asorb it all in one reading. It is a book that I look forward to reading again...'
 -
...
Branded Customer Service : The New Competitive Edge
Branded Customer Service : The New Competitive Edge

By applying the concepts in this book, organizations can use customer service as a powerful tool for establishing and maintaining a distinct brand identity.


Branding is an integral part of modern business strategy. But while there are dozens of books on branding products and marketing campaigns, nobody has applied the...

Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry...
From Expert Student to Novice Professional (Professional Learning and Development in Schools and Higher Education)
From Expert Student to Novice Professional (Professional Learning and Development in Schools and Higher Education)

Students entering higher education expect their studies to lead them towards some specific form of professional career. But in this age, complex internationalized professions are the main source of work for graduates, so students need to prepare themselves for a future that can be volatile, changeable and challenging. This book shows how...

Instant Nokogiri
Instant Nokogiri

Learning data scraping and parsing in Ruby using the Nokogiri gem

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Master Nokogiri with the use of clear, step-by-step instructions and real world examples
  • ...
Essential Essays, Volume 1: Foundations of Cultural Studies (Stuart Hall: Selected Writings)
Essential Essays, Volume 1: Foundations of Cultural Studies (Stuart Hall: Selected Writings)
From his arrival in Britain in the 1950s and involvement in the New Left, to founding the field of cultural studies and examining race and identity in the 1990s and early 2000s, Stuart Hall has been central to shaping many of the cultural and political debates of our time. Essential Essays—a landmark two-volume...
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Programming Languages and Systems: 7th European Symposium on Programming, ESOP'98, Held as Part of the Joint European Conferences on Theory
Programming Languages and Systems: 7th European Symposium on Programming, ESOP'98, Held as Part of the Joint European Conferences on Theory
The European conference situation in the general area of software science has long been considered unsatisfactory. A fairly large number of small and mediumsized conferences and workshops take place on an irregular basis, competing for high-quality contributions and for enough attendees to make them financially viable....
Branding Yourself: How to Use Social Media to Invent or Reinvent Yourself (Que Biz-Tech)
Branding Yourself: How to Use Social Media to Invent or Reinvent Yourself (Que Biz-Tech)

Use Social Media to Build a Great Personal Brand–and a Great Career!

 

Need to demonstrate more value to customers or employers? Want a new job or career? Use social media to build the powerful personal brand that gets you what you want! In...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy