Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Silicon Germanium: Technology, Modeling, and Design
Silicon Germanium: Technology, Modeling, and Design
Filled with in-depth insights and expert advice, Silicon Germanium covers all the key aspects of this technology and its applications. Beginning with a brief introduction to and historical perspective of IBM’s SiGe technology, this comprehensive guide quickly moves on to:
  • Detail many of IBM’s SiGe technology development...
Materialized Views: Techniques, Implementations, and Applications
Materialized Views: Techniques, Implementations, and Applications

Materialized views have recently seen a renewed interest in the research and commercial communitites because of their applications in warehousing, retailing, billing, visualization, integrity constraints, query optimization, and decision support. All leading database vendors are currently implementing in their systems materialized views...

Coping with Caveats in Coalition Warfare: An Empirical Research Program
Coping with Caveats in Coalition Warfare: An Empirical Research Program
This book develops a framework for analysis, and a set of research strategies, to better understand the conditions and mechanisms involved in the considerable use of caveats by states contributing militarily to coalition operations. In the professional language of military servicemen, security analysts and decision-makers, “caveats”...
Information Systems Security: 6th International Conference, ICISS 2010
Information Systems Security: 6th International Conference, ICISS 2010

The number of World Wide Web users has risen to nearly 1.5 billion [58], a fifth of the world’s population. Development of innovative web based technologies has resulted in this explosive growth. Using the Web, end-users have benefited tremendously in numerous areas such as electronic commerce, health care and education. Due to the...

Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
Google+ for Photographers
Google+ for Photographers

Prior to Google+, Photographers relied on a mix of Twitter, Facebook, Flickr, and other services to display their work and interact with others. No single service provided photographers with a complete set of tools that allowed them to connect with others in a rich, meaningful way–until now.

Unlike other social
...

Handbook of Research on Wireless Security
Handbook of Research on Wireless Security
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to...
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web...
Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)
Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)

Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Securing PHP Apps
Securing PHP Apps

Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.

Is your PHP app truly secure? Let's make sure you get home...

CCNP ONT Portable Command Guide (Self-Study Guide)
CCNP ONT Portable Command Guide (Self-Study Guide)
Welcome to ONT! In 2006, Cisco Press came to me and told me, albeit very quietly, that there was going to be a major revision of the CCNP certification exams. Then they asked whether I would be interested in working on a command guide in the same fashion as my previous books for Cisco Press: the Cisco Networking Academy Program ...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy