Home | Amazing | Today | Tags | Publishers | Years | Search 
3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
For businesses that are either planning to launch a new e-business or increase the profits of an existing one, this book provides techniques and methods to increase effectiveness and growth. Approaches to viewing a company's foundation introspectively through products, services, branding, target markets, online objectives, and budget are discussed,...
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

Deductive Databases and Their Applications
Deductive Databases and Their Applications
Deductive Databases and their Applications is an introductory text aimed at undergraduate students with some knowledge of database and information systems. The text comes complete with exercises and solutions to encourage students to tackle problems practically as well as theoretically. The author presents the origins of deductive databases in...
Advanced Error Control Techniques for Data Storage Systems
Advanced Error Control Techniques for Data Storage Systems
With the massive amount of data produced and stored each year, reliable storage and retrieval of information is more crucial than ever. Robust coding and decoding techniques are critical for correcting errors and maintaining data integrity. Comprising chapters thoughtfully selected from the highly popular Coding and Signal Processing for Magnetic...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)

This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent...

Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
The Aerospace and Defence industry has been at the forefront of systems engineering for many decades. The imperatives of commercial success and / or military need have compelled those in the Industry to seize the opportunities offered by taking a systems engineering approach to solve a variety of complex problems.

The insights offered by
...
Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Ada for Software Engineers
Ada for Software Engineers
Ada has become the language of choice for high integrity software systems, and is now used extensively in applications such as transportation, finance, aerospace and heavy industry. This book is aimed at professional software engineers making the transition to Ada, and at students using Ada for advanced undergraduate projects or graduate research....
Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (SOC) promises a world of cooperating services loosely connected, creating dynamic business processes and agile applications that span organizations and platforms. As a computing paradigm, it utilizes services as fundamental elements to support rapid, low-cost development of distributed applications in heterogeneous...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy