 |
|
 |  |  |  |  Deductive Databases and Their ApplicationsDeductive Databases and their Applications is an introductory text aimed at undergraduate students with some knowledge of database and information systems. The text comes complete with exercises and solutions to encourage students to tackle problems practically as well as theoretically. The author presents the origins of deductive databases in... |
|
|
 Aircraft Systems: Mechanical, Electrical and Avionics Subsystems IntegrationThe Aerospace and Defence industry has been at the forefront of systems engineering for many decades. The imperatives of commercial success and / or military need have compelled those in the Industry to seize the opportunities offered by taking a systems engineering approach to solve a variety of complex problems.
The insights offered by... |  |  Designing Security Architecture SolutionsThe first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security... |  |  Ada for Software EngineersAda has become the language of choice for high integrity software systems, and is now used extensively in applications such as transportation, finance, aerospace and heavy industry. This book is aimed at professional software engineers making the transition to Ada, and at students using Ada for advanced undergraduate projects or graduate research.... |
|
 Service-Oriented Computing (Cooperative Information Systems)Service-Oriented Computing (SOC) promises a world of cooperating services loosely connected, creating dynamic business processes and agile applications that span organizations and platforms. As a computing paradigm, it utilizes services as fundamental elements to support rapid, low-cost development of distributed applications in heterogeneous... |  |  Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |  |  Enterprise Web Services Security (Internet Series)Learn to Protect Your Assets and Prevent Attacks!
The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security... |
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |