Home | Amazing | Today | Tags | Publishers | Years | Search 
Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Ada for Software Engineers
Ada for Software Engineers
Ada has become the language of choice for high integrity software systems, and is now used extensively in applications such as transportation, finance, aerospace and heavy industry. This book is aimed at professional software engineers making the transition to Ada, and at students using Ada for advanced undergraduate projects or graduate research....
Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
The Aerospace and Defence industry has been at the forefront of systems engineering for many decades. The imperatives of commercial success and / or military need have compelled those in the Industry to seize the opportunities offered by taking a systems engineering approach to solve a variety of complex problems.

The insights offered by
...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

The Physics of Coronary Blood Flow (Biological and Medical Physics, Biomedical Engineering)
The Physics of Coronary Blood Flow (Biological and Medical Physics, Biomedical Engineering)
Coronary blood flow is blood flow to the heart for its own metabolic needs. In the most common form of heart disease there is a disruption in this flow because of obstructive disease in the vessels that carry the flow. The subject of coronary blood flow is therefore associated mostly with the pathophysiology of this disease, rarely with dynamics or...
Smart Technologies for Safety Engineering
Smart Technologies for Safety Engineering
Smart technologies comprise a dynamic new interdisciplinary research field that encompasses a wide spectrum of engineering applications including, but not limited to, intelligent structures and materials, actuators, sensors and structural observability, control systems and software tools for the design of adaptive structures. Smart technologies...
Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications

How to Design a Secure Multimedia Encryption Scheme

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...

Design and Use of Relational Databases in Chemistry
Design and Use of Relational Databases in Chemistry
Design and Use of Relational Databases in Chemistry helps programmers and users improve their ability to search and manipulate chemical structures and information, especially when using chemical database “cartridges”. It illustrates how the organizational, data integrity, and extensibility properties of relational...
Nano-CMOS Design for Manufacturability: Robust Circuit and Physical Design for Sub-65nm Technology Nodes
Nano-CMOS Design for Manufacturability: Robust Circuit and Physical Design for Sub-65nm Technology Nodes
This book is the sequel to Nano-CMOS Circuit and Physical Design, taking design to technology nodes beyond 65nm geometries. It examines the challenges that design engineers face in the nano-scaled era, such as exacerbated effects and the proven design for manufacturability (DFM) methodology in the midst of increasing variability and design process...
Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP shows non-programmers how Access databases can be created, managed, and customized with Visual Basic for Applications (VBA) -- a powerful programming language built into Access. Hundreds of hands-on examples and projects throughout the book show users how to take charge of their Access...
Lasers in the Preservation of Cultural Heritage: Principles and Applications (Optics and Optoelectronics)
Lasers in the Preservation of Cultural Heritage: Principles and Applications (Optics and Optoelectronics)
The book … describes how laser parameters associated with cleaning are chosen and the physics involved in various surface ablation processes. Key conservation practices are also addressed, such as removal of black encrustation from stone, varnish from paintings, and the laser cleaning of metals and paper. It details the use and benefit of...
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy