Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Model-Based Development: Applications
Model-Based Development: Applications

A Proven Development Methodology That Delivers On the Promise of Model-Based Approaches

Software continues to become more and more complex, while software consumers’ expectations for performance, reliability, functionality, and speed-to-market are also growing exponentially. H. S. Lahman shows how...

Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (SOC) promises a world of cooperating services loosely connected, creating dynamic business processes and agile applications that span organizations and platforms. As a computing paradigm, it utilizes services as fundamental elements to support rapid, low-cost development of distributed applications in heterogeneous...
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Chemical Process Safety: Learning from Case Histories
Chemical Process Safety: Learning from Case Histories
"Given his extensive background in an industrial setting as a team leader at the PPG Chlor-Alkali Plant in Louisiana and the safety course that he taught for AIChE with the well-known safety expert Trevor Kletz, the quantity of information of a practical nature contained in this book is not surprising."
 - Gary Bennett,
...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Linux on HP Integrity Servers
Linux on HP Integrity Servers
Companies are increasingly turning to Linux on HP Integrity systems for high-performance computing, large enterprise and database applications, and 64-bit application development. However, Linux administration in the HP Integrity's Itanium® 2-based environment is significantly different than on conventional IA-32 platforms. Now, there's a...
Global Brand Strategy: Unlocking Brand Potential Across Countries, Cultures & Markets
Global Brand Strategy: Unlocking Brand Potential Across Countries, Cultures & Markets

In Global Brand Strategy, Sicco van Gelder tackles this central issue head on. He shows how both global and local brand management need to agree on a common basis for their brand strategy and planning. Drawing on his extensive experience, he has created a unique framework—the Global Brand Proposition Model—which enables them...

Concepts of Database Management
Concepts of Database Management
This concise yet comprehensive introduction to fundamental database concepts is an indispensable resource to develop your knowledge of database management concepts. Now in its sixth edition, Concepts of Database Management maintains the focus on real-world cases that made previous editions so effective addressing the most current database issues...
How: Why How We Do Anything Means Everything...in Business (and in Life)
How: Why How We Do Anything Means Everything...in Business (and in Life)
The flood of information and unprecedented transparency reshaping today's business world has dramatically changed the rules of the game. It's no longer what you do that sets you apart from others, but how you do what you do. Whats are commodities, easily duplicated or reverse-engineered. Sustainable advantage and enduring success—for both...
Advanced Error Control Techniques for Data Storage Systems
Advanced Error Control Techniques for Data Storage Systems
With the massive amount of data produced and stored each year, reliable storage and retrieval of information is more crucial than ever. Robust coding and decoding techniques are critical for correcting errors and maintaining data integrity. Comprising chapters thoughtfully selected from the highly popular Coding and Signal Processing for Magnetic...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy