Home | Amazing | Today | Tags | Publishers | Years | Search 
Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Information Modeling for Internet Applications
Information Modeling for Internet Applications

Different kinds of objects containing data are found on the Internet, including structured (e.g., relational) databases, collections of documents, and search engines. On the one hand, creating, storing, manipulating, and retrieving Internet documents can benefit from techniques known from the databases and data modeling...

Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)
Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)

Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear...

Pro Spring Batch
Pro Spring Batch

Since its release, Spring Framework has transformed virtually every aspect of Java development including web applications, security, aspect-oriented programming, persistence, and messaging. Spring Batch, one of its newer additions, now brings the same familiar Spring idioms to batch processing. Spring Batch addresses the needs of any batch...

Web Engineering: A Practioner's Approach
Web Engineering: A Practioner's Approach

As we began to plan this book, we worried that it would become lost in the hundreds—no, thousands—of volumes that have been written on “Web design,” HTML, Java, XML, or any of the myriad technologies that must be understood to build successful Web-based systems and applications (WebApps). To our surprise, we...

Database Systems: Design, Implementation, and Management
Database Systems: Design, Implementation, and Management

For many reasons, few books survive to reach their eighth edition. Authors and publishers who let the success of their earlier work produce the comfort of complacency usually pay the price of watching the marketplace dismantle their creations. This database systems book has been successful through seven editions because we–the...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Pro Access 2010 Development
Pro Access 2010 Development

Microsoft Access is a unique platform that enables rapid development of database applications. It has been a long-time favorite of both developers and end users for creating single-user and small-scale office automation solutions. Recent improvements have made it a viable choice for enterprise-class applications as well. In this book,...

Integrated Auditing of ERP Systems
Integrated Auditing of ERP Systems

This book is designed not to provide detailed audit/review programs for ERP systems but to underline the main concepts involved in each major phase of the ERP life cycle, as well as the major components of ERP systems of special interest to auditors. It is intended to familiarize the reader with the built-in controls in the ERP architecture...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Information Systems Security: 6th International Conference, ICISS 2010
Information Systems Security: 6th International Conference, ICISS 2010

The number of World Wide Web users has risen to nearly 1.5 billion [58], a fifth of the world’s population. Development of innovative web based technologies has resulted in this explosive growth. Using the Web, end-users have benefited tremendously in numerous areas such as electronic commerce, health care and education. Due to the...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy