Setting macroeconomic policy is especially difficult in fragile states. Political legitimacy concerns are heightened, raising issues such as who the policymakers are, what incentives they face, and how the process of policymaking is likely to work under limited legitimacy and high uncertainty
both about the macroeconomic environment...
Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...
Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by...
Ideal for any IT professional who uses Cisco technologies on a daily basis, or anyone who is preparing for their Cisco Certified Network Professional (CCNP) certification.
The topics covered will be more in depth than other introductory-level books of similar topics, and will span from layer 2 technologies such as switching, STP,...
C# has matured over the past decade: It’s now a rich language with generics, functional programming concepts, and support for both static and dynamic typing. This palette of techniques provides great tools for many different idioms, but there are also many ways to make mistakes. In Effective C#, Second...
This book stems from my experience over the last few years in designing high-speed digital logic using ASIC design flows. I discovered that while it is possible to significantly improve performance in ASIC implementations with deep pipelining and careful physical design, a speed penalty still had to be paid due to their exclusive use of...
The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...
Verity Stob is the comedienne of the programming world. She has been writing satirical chronicles of techie life since 1988. Her column first appeared in the legendary .EXE Magazine, then Dr. Dobbs' Journal, and it now graces The Register.
This book summarizes the radiation physics knowledge that professionals working in medical physics need to master for efficient and safe dealings with ionizing radiation. It contains eight chapters, each chapter covering a specific group of subjects related to radiation physics and is intended as a textbook for a course in radiation physics...
Discover All the Advantages of Using Design for Six Sigma to Develop and Build Customer Value-Based Products
Voice of the Customer Capture and Analysis equips Six Sigma you with the skills needed to create and deploy surveys, capture real customers need with ethnographic methods, immediately analyze the results, and...