|
|
|
|
Gilded Youth: Privilege, Rebellion and the British Public School
The British public school is an iconic institution, a training ground for the ruling elite and a symbol of national identity and tradition. But beyond the elegant architecture and evergreen playing fields is a turbulent history of teenage rebellion, sexual dissidence, and political radicalism. James Brooke-Smith wades into the ... | | Look Both Ways: Help Protect Your Family on the InternetLearn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a... | | Jews and Judaism in Modern China (Routledge Jewish Studies Series)Jews and Judaism in Modern China explores and compares the dynamics at work in two of the oldest, intact and starkly contrasting civilizations on earth; Jewish and Chinese. The book studies how they interact in modernity and how each civilization views the other, and analyses areas of cooperation between scholars, activists and... |
|
| | GlassFish Security
Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.
Learn to secure Java EE... | | Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland
ICALP 2011, the 38th edition of the International Colloquium on Automata,
Languages and Programming, was held in Z¨urich, Switzerland, during July
4–8, 2011. ICALP is a series of annual conferences of the European Association
for Theoretical Computer Science (EATCS) which first took place in 1972. This
year, the ICALP... |
|
|
| | Computer Security in the 21st CenturyComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include... | | Computer Security HandbookThe definitive formula for computer security, from power outages to theft and sabotage
Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and... |
|
|
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |