Home | Amazing | Today | Tags | Publishers | Years | Search 
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Integrated Circuit Packaging, Assembly and Interconnections (Springer Series in Advanced Microelectronics)
Integrated Circuit Packaging, Assembly and Interconnections (Springer Series in Advanced Microelectronics)
The integrated circuit with each new generation has been characterized by increasing functionality. In the 1980’s Very Large Scale Integrated Circuits (VLSIC) began to emerge with transistor counts approaching one million plus per chip! The IC package quickly became more than a “chip carrier”. Now the packaging...
Essential Skills for the Agile Developer: A Guide to Better Programming and Design
Essential Skills for the Agile Developer: A Guide to Better Programming and Design

Agile has become today’s dominant software development paradigm, but agile methods remain difficult to measure and improve. Essential Skills for the Agile Developer fills this gap from the bottom up, teaching proven techniques for assessing and optimizing both individual and team agile practices.

...

Computer Architecture: Fundamentals and Principles of Computer Design
Computer Architecture: Fundamentals and Principles of Computer Design
Digital electronic computer systems have gone through several generations, and many changes, since they were first built just before and during World War II. Machines that were originally implemented with electromechanical relays and vacuum tubes gave way to those constructed with solid-state devices and, eventually, integrated...
Handbook of Research on Digital Media and Advertising: User Generated Content Consumption (1 volume)
Handbook of Research on Digital Media and Advertising: User Generated Content Consumption (1 volume)
When first thinking of putting together a compilation of writings on a particular topic, those that have such a notion believe they will give meaning to a paradigm, influence a research area, or at a minimum shed light exploring a critical phenomenon. Ultimately, the editors and authors hope that the exchange for the reader - in...
HornetQ Messaging Developer's Guide
HornetQ Messaging Developer's Guide
Any person involved in the field of software development has used and is comfortable with the expression "big data".

With the rise of the social network paradigm, new types of challenges have raised attention in the developer community. Only to make an example of the numbers involved, let us take a look
...
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Ambient Intelligence - Software and Applications: 3rd International Symposium on Ambient Intelligence
Ambient Intelligence - Software and Applications: 3rd International Symposium on Ambient Intelligence

Ambient Intelligence (AmI) is a recent paradigm emerging from Artificial Intelligence (AI), where computers are used as proactive tools assisting people with their day-to-day activities, making everyone’s life more comfortable. Another main concern of AmI originates from the human computer interaction domain and focuses on offering ways...

Oracle9i Administration and Management
Oracle9i Administration and Management
With Oracle8 and Oracle8i, Oracle Corporation began a trend in database modernization that has culminated in the Oracle9i release. Many consider Oracle9i to actually be 8.2; I would argue that with the multitude of new features, structures, and capabilities, 9i qualifies as a new release.

Oracle’s power
...
Cryptography and Network Security
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in many ways. A new paradigm of commerce allows individuals to shop online. The World Wide Web (WWW) allows people to share information. The E-mail technology conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
Pro HTML5 Programming (Professional Apress)
Pro HTML5 Programming (Professional Apress)

This book is about HTML5 Programming. Before you can understand HTML5 programming, however, you need to take a step back and understand what HTML5 is, a bit of the history behind it, and the differences between HTML 4 and HTML5.

In this chapter, we get right to the practical questions to which everyone wants answers. Why
...

Pro Windows Phone App Development (Professional Apress)
Pro Windows Phone App Development (Professional Apress)
Windows Phone, updated in Windows Phone 7.5, presents an exciting opportunity for developers to build and monetize mobile applications. It represents a major new investment into mobile computing by Microsoft, and in many ways is a major break from the past. To build applications for Windows Phone, it is important to understand its...
Result Page: 47 46 45 44 43 42 41 40 39 38 37 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy