Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How Do I Save My Honor?: War, Moral Integrity, and Principled Resignation
How Do I Save My Honor?: War, Moral Integrity, and Principled Resignation
"A fascinating and urgently needed exploration of moral responsibility in wartime, focusing on the complex realities and demands since 9/11. This engagingly written and well-researched study challenges each of us to honor our better selves." --Richard Falk, University of California, Santa Barbara

"Felice has written the
...
Security for Web Services and Service-Oriented Architectures
Security for Web Services and Service-Oriented Architectures

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with...

Content Distribution Networks: An Engineering Approach
Content Distribution Networks: An Engineering Approach
Content distribution networks (CDNs) are the most promising new techniques for coping with the huge and swiftly growing volume of Internet traffic. In essence, CDNs are groups of proxy-servers located at strategic points around the Internet and arranged so as to ensure that a download request can always be handled from the nearest server. In this,...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Repairing and Querying Databases under Aggregate Constraints (SpringerBriefs in Computer Science)
Repairing and Querying Databases under Aggregate Constraints (SpringerBriefs in Computer Science)
Research has deeply investigated several issues related to the use of integrity constraints on relational databases. In particular, a great deal of attention has been devoted to the problem of extracting "reliable" information from databases containing pieces of information inconsistent with regard to some integrity constraints. In...
Special Edition Using Microsoft Office Excel 2007
Special Edition Using Microsoft Office Excel 2007
We crafted this book to grow with you, providing the reference material you need as you move toward Excel proficiency and use of more advanced features. If you buy only one book on Excel, Special Edition Using Microsoft® Office Excel® 2007 is the book you need.

 

Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

The present book 1 provides a rigorous treatment and coherent presentation of the consolidated results of the authors' work, over the past four years, on the employment of logic programming as a representational and reasoning tool. It comes out of a background of a world-wide research effort for at least the past six years on the...

Electromagnetics Explained: A Handbook for Wireless/ RF, EMC, and High-Speed Electronics, Part of the EDN Series for Design Engineers
Electromagnetics Explained: A Handbook for Wireless/ RF, EMC, and High-Speed Electronics, Part of the EDN Series for Design Engineers
*Covers topics using conceptual explanations and over 150 lucid figures, in place of complex mathematics
*Demystifies antennas, waveguides, and transmission line phenomena
*Provides the foundation necessary to thoroughly understand signal integrity issues associated with high-speed digital design

Written for engineers by an
...
3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
For businesses that are either planning to launch a new e-business or increase the profits of an existing one, this book provides techniques and methods to increase effectiveness and growth. Approaches to viewing a company's foundation introspectively through products, services, branding, target markets, online objectives, and budget are discussed,...
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science)
Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science)
This book tackles the problems of update algorithms for databases. How can one construct and maintain a database of facts, capable of incorporating new information and getting rid of all outdated information, and yet in the process not disturb any other information in the database? The author has produced a formal method of specifying the...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy