|
|
|
|
|
E-health Systems Diffusion And Use: The Innovation, the User And the Use It ModelE-Health Systems Diffusion and Use: The Innovation, the User and the Use IT Model offers an overview of the use and diffusion of information systems in the health care sector with particular attention to the role of the user. This book starts with classic contributions and modifications and then continues with contemporary contributions, which... | | Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... | | |
|
The Slayer's Guide To DerroThe derro have long been a mysterious race, hiding in darkness, their presence frequently but a whisper. Brought to the fore in this supplement, their culture, habitats, methods of warfare, and more are detailed in full so as to be usable by game masters and players alike.
The dwarven racesarequitediverse,but perhapsthe most deviant,... | | Absolute Beginner's Guide to Personal FirewallsThe Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal... | | The 8051 Microcontroller: Architecture, Programming, and ApplicationsDesigned as a main or supplementary text for courses on microprocessors or microcontrollers. Packaged with a customized disk containing an 8051 assembler and 8051 simulator. Focuses on programming the Intel 8051 microcontroller, one of the most common microprocessors used in controls or instrumentation applications using assembly code. Text has... |
|
Hacking Exposed WirelessSecure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute... | | Robust Control Systems with Genetic Algorithms (Control Series)
In recent years, new paradigms have emerged to replace-or augment-the traditional, mathematically based approaches to optimization. The most powerful of these are genetic algorithms (GA), inspired by natural selection, and genetic programming, an extension of GAs based on the optimization of symbolic codes.
Robust... | | Hack Proofing XMLXML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document... |
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |