Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Stewarding Sustainability Transformations: An Emerging Theory and Practice of SDG Implementation
Stewarding Sustainability Transformations: An Emerging Theory and Practice of SDG Implementation
In the context of the world’s pressing sustainability challenges this new Report to the Club of Rome presents a novel approach to navigating collaborative change in partnerships between governments, research institutions, corporations and civil society activists. With reference to the 17 Sustainable Development Goals and the Planetary...
Global Nonlinear Dynamics for Engineering Design and System Safety (CISM International Centre for Mechanical Sciences (588))
Global Nonlinear Dynamics for Engineering Design and System Safety (CISM International Centre for Mechanical Sciences (588))
This is the first book which exploits concepts and tools of global nonlinear dynamics for bridging the gap between theoretical and practical stability of systems/structures, and for possibly enhancing the engineering design in macro-, micro- and nano-mechanics. Addressed topics include complementing theoretical and practical stability to achieve...
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Perceptual Computing: Aiding People in Making Subjective Judgments
Perceptual Computing: Aiding People in Making Subjective Judgments

Explains for the first time how "computing with words" can aidin making subjective judgments

Lotfi Zadeh, the father of fuzzy logic, coined the phrase"computing with words" (CWW) to describe a methodology in which theobjects of computation are words and propositions drawn from anatural language....

C in Depth
C in Depth
In the third edition of the book C in depth , the authors explain the basics of the programming language while maintaining the integrity and clarity of the programs. The book can be utilized by both beginners and advanced level programmers as a self-evaluation and learning source. There are more than 310 programs with explanations to illustrate...
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Handbook of Research on Wireless Security
Handbook of Research on Wireless Security
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to...
Database Systems: A Pragmatic Approach
Database Systems: A Pragmatic Approach

Database Systems: A Pragmatic Approach is a classroom textbook for use by students who are learning about relational databases, and the professors who teach them. It discusses the database as an essential component of a software system, as well as a valuable, mission critical corporate resource. The book is based on lecture notes...

T-SQL Fundamentals (3rd Edition)
T-SQL Fundamentals (3rd Edition)

Effectively query and modify data using Transact-SQL
Master T-SQL fundamentals and write robust code for Microsoft SQL Server and Azure SQL Database. Itzik Ben-Gan explains key T-SQL concepts and helps you apply your knowledge with hands-on exercises. The book first introduces
...

Domain-Driven Design: Tackling Complexity in the Heart of Software
Domain-Driven Design: Tackling Complexity in the Heart of Software

The software development community widely acknowledges that domain modeling is central to software design. Through domain modeling, software developers are able to express rich functionality and translate that functionality into software implementation that truly serves the needs of its users. Despite its obvious importance,...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy