|
|
|
|
|
|
|
The Unified Process Inception Phase : Best Practices for Implementing the UPIs the Unified Process the be all and end all standard for developing object-oriented component-based software? This book is the third in a four volume series that presents a critical review of the Unified Process. The authors present a survey of the alte
Fill the gap between theory and practice! Implement a software process that goes... | | | | Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 |