Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

The Bible on Leadership: From Moses to Matthew-Management Lessons for Contemporary Leaders
The Bible on Leadership: From Moses to Matthew-Management Lessons for Contemporary Leaders
Millions have been inspired by the Bible's spiritual lessons. Now, Lorin Woolfe provides a unique way to view the Bible . . . for leadership lessons that can be applied to our modern business world.

Consider David's courage and innovation in slaying Goliath with just a stone and a sling; Moses' outstanding "succession...

Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers

Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money...

Windows Server 2012: Up and Running
Windows Server 2012: Up and Running
Windows Server 2012 is not only the most significant update to the Windows Server operating system in recent years, but it is also all about cloud computing and the underlying technology for building clouds: virtualization.

Many features familiar to administrators of Server 2008 R2 and other legacy
...
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.>

  • Comprehensive coverage and practical examples of the industry...

Automotive Electromagnetic Compatibility (EMC)
Automotive Electromagnetic Compatibility (EMC)
This book is an introduction to the subject of EMC for automotive engineers, test engineers and technicians. Its focus is on the practical use and application of EMC concepts. Contents include basic concepts, such as power and signal integrity, antennas and transmission lines, active and passive components, testing, cabling, signal and power...
The Foundations of Signal Integrity
The Foundations of Signal Integrity

The first book to focus on the electromagnetic basis of signal integrity

The Foundations of Signal Integrity is the first of its kind—a reference that examines the physical foundation of system integrity based on electromagnetic theory derived from Maxwell's Equations. Drawing upon the cutting-edge...

Network Security Technologies, Second Edition
Network Security Technologies, Second Edition

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security...

Design Verification with e (Prentice Hall Modern Semiconductor Design Series' Sub Series: PH Signal Integrity Library)
Design Verification with e (Prentice Hall Modern Semiconductor Design Series' Sub Series: PH Signal Integrity Library)

Written for both experienced and new users, Design Verification with e gives you a broad coverage of e. It stresses the practical verification perspective of e rather than emphasizing only its language aspects.

This book—

Engineering Asset Management 2011: Proceedings of the Sixth World Congress on Engineering Asset Management (Lecture Notes in Mechanical Engineering)
Engineering Asset Management 2011: Proceedings of the Sixth World Congress on Engineering Asset Management (Lecture Notes in Mechanical Engineering)

This text represents state-of-the-art trends and developments in the emerging field of engineering asset management as presented at the Sixth World Congress on Engineering Asset Management (WCEAM) held in Cincinnati, OH, USA from October 3-5, 2011

The Proceedings of the WCEAM 2011 is an excellent reference for practitioners,
...

View Updating and Relational Theory (Theory in Practice)
View Updating and Relational Theory (Theory in Practice)

Views are virtual tables. That means they should be updatable, just as "real" or base tables are. In fact, view updatability isn’t just desirable, it’s crucial, for practical reasons as well as theoretical ones. But view updating has always been a controversial topic. Ever since the relational...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy