Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Always Use Protection: A Teen's Guide to Safe Computing
Always Use Protection: A Teen's Guide to Safe Computing
Dan Appleman's career is typical of someone who, unable to choose what he wants to do for a living, decides to do everything. From founding a software company (Desaware), to cofounding a publishing company (Apress), to programming, to writing books (this is his seventh), he's a Brm believer that the question 'What do...
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)

Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks equips you for this new world. See how emerging technologies such as actors and...

Transformation of Sydney’s Industrial Historic Waterfront: The Production of Tourism for Consumption
Transformation of Sydney’s Industrial Historic Waterfront: The Production of Tourism for Consumption
This book examines the impacts of tourism-led transformations on the industrial historical waterfront at Darling Harbour and The Rocks in Sydney, Australia in the context of urban restructuring and deindustrialisation. The book also offers an extended reflection on the paradoxes between tourism and heritage. This discussion is not a new concept....
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)
Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)

Publius Syrus stated back in 42 B.C., “You cannot put the same shoe on every foot.” (Maxim 596) Though written long before the advent of forensic science, Syrus’ maxim summarizes the theme of Forensic Medicine of the Lower Extremity: Human Identification and Trauma Analysis of the Thigh, Leg, and Foot. Put simply, the lower...

Culture and Group Processes (Frontiers of Culture and Psychology)
Culture and Group Processes (Frontiers of Culture and Psychology)

Human beings are adapted for group living. Groups have a wide range of adaptive functions for individuals, including both material benefits of mutual aid and collective action, and subjective psychological benefits of affiliation and social identity. Recent development of cultural psychology, however, has uncovered that culture plays crucial...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Creatures of Cain: The Hunt for Human Nature in Cold War America
Creatures of Cain: The Hunt for Human Nature in Cold War America

How Cold War America came to attribute human evolutionary success to our species' unique capacity for murder

After World War II, the question of how to define a universal human nature took on new urgency. Creatures of Cain charts the rise and precipitous fall in Cold War America of a theory that
...

Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? ...

Worldmark Encyclopedia of Cultures and Daily Life
Worldmark Encyclopedia of Cultures and Daily Life

Th e Worldmark Encyclopedia of Cultures and Daily Life, Second Edition, contains over 500 articles exploring the ways of life of peoples of the world. Arranged in fi ve volumes by geographic regions—Africa, Americas, Asia & Oceania (two volumes), and Europe—the volumes of this encyclopedia parallel the organization of its...

The Rational Homo Psychologicus: Creating Thoughtful Businesses
The Rational Homo Psychologicus: Creating Thoughtful Businesses

This is a challenger book. It systematically modifies the assumptions of the homo economicus and homo sociologicus by constructing a deeper foundation of human and corporate personhood. The new theory of homo psychologicus probes into a long-forgotten common sense: humans are rationally irrational homo psychologicus, as are...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy