|
|
|
|
Silicon Germanium: Technology, Modeling, and DesignFilled with in-depth insights and expert advice, Silicon Germanium covers all the key aspects of this technology and its applications. Beginning with a brief introduction to and historical perspective of IBM’s SiGe technology, this comprehensive guide quickly moves on to:
- Detail many of IBM’s SiGe technology development
... | | Materialized Views: Techniques, Implementations, and Applications
Materialized views have recently seen a renewed interest in the research and commercial communitites
because of their applications in warehousing, retailing, billing, visualization, integrity constraints,
query optimization, and decision support. All leading database vendors are currently
implementing in their systems materialized views... | | Coping with Caveats in Coalition Warfare: An Empirical Research Program
This book develops a framework for analysis, and a set of research strategies, to better understand the conditions and mechanisms involved in the considerable use of caveats by states contributing militarily to coalition operations. In the professional language of military servicemen, security analysts and decision-makers, “caveats”... |
|
Information Systems Security: 6th International Conference, ICISS 2010
The number of World Wide Web users has risen to nearly 1.5 billion [58], a fifth of the world’s population. Development of innovative web based technologies has resulted in this explosive growth. Using the Web, end-users have benefited tremendously in numerous areas such as electronic commerce, health care and education. Due to the... | | Web Security Field GuideWhile the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient... | | Google+ for Photographers
Prior to Google+, Photographers relied on a mix of Twitter, Facebook, Flickr, and other services to display their work and interact with others. No single service provided photographers with a complete set of tools that allowed them to connect with others in a rich, meaningful way–until now.
Unlike other social... |
|
Handbook of Research on Wireless SecuritySecurity is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to... | | | | |
|
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |