This book is generally about software intellectual property and specifically
about the field of software forensics. While you may never testify in a courtroom,
attempt to deduce the true owner of a valuable program, or measure the
intellectual property (IP) value of software source code, if you are at all involved
with software you...
Automation systems, often referred to as SCADA systems, involve programming at several levels; these systems include computer type field controllers that monitor and control plant equipment such as conveyor systems, pumps, and user workstations that allow the user to monitor and control the equipment through color graphic displays. All of the...
A toolkit of 60 practical ways by which the reader can think faster to reach earlier decisions, without neglecting a conscious, deliberate, and reflective approach
Creating new ideas and growth opportunities is the lifeblood of any organization, but time to come up with new...
Provides a detailed understanding of program management. Updates to the Third Edition include: Program Life Cycle assigned its own chapter to provide details of the unique set of elements that make up the program management phase; highlights the full scope of program management and clarifies the supporting processes that complete the delivery...
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
Make informed decisions about planning and installing 802.11 “Wi-Fi” wireless networks. This book helps you tackle the challenge, whether installing Wi-Fi within an existing corporate network, or setting up a wireless network from scratch in any business or organization. Author Janice Reynolds guides you through everything you need...
An understanding of when and how to intervene is the key to good obstetric care. This textbook is an encompassing reference covering all the essential information relating to childbirth; it offers clear practical guidance on all aspects of labour and delivery. Written by well-known leading experts, each chapter offers a modern authoritative...
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...
Targeted for small business owners interested in how the Web can extend their business reach and profitability, this book explains how to create an online presence for an existing small business. Many business owners want to become part of the e-commerce revolution, but have unrealistic expectations that a Web site will instantly perform...
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...