 |
|
|
 S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management
This book constitutes the refereed proceedings of the First Workshop on Subject-Oriented Business Process Management, S-BPM ONE 2009, held in Karlsruhe, Germany, in October 2009. The papers are organized in topical sections on visionary engagements; essential capabilities; and penetration perspectives.
This volume contains a... |  |  Worldmark Encyclopedia of the Nations, United Nations
Th e swift course of domestic and world events, part of a hastened process of change, requires an enormous increase of basic understanding by peoples of the multiple factors infl uencing the tempo and direction of national developments. Th e pattern of intercultural penetration and cross-fertilizing exchanges of scientifi c and technological... |  |  Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |
|
 Hacking Exposed Wireless, Second Edition
The latest wireless security solutions
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily... |  |  Core and Metro Networks
It is commonly accepted today that optical fiber communications have revolutionized telecommunications. Indeed, dramatic changes have been induced in the way we interact with our relatives, friends, and colleagues: we retrieve information, we entertain and educate ourselves, we buy and sell, we organize our activities, and so on, in a long... |  |  Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend... |
|
 |  |  Information and Communications Technologies OECD Communications Outlook 2007The OECD Communications Outlook provides an extensive range of indicators for different types of communications networks and compares performance indicators such as revenue, investment, employment and prices for service throughout the OECD area. These indicators are essential for industry and for regulators who use benchmarking to evaluate policy... |  |  Renewable Energy (Energy Science and Engineering)The present edition has been updated in a number of renewable energy technology areas (Chapter 4 and 5), where progress have been made over the recent years. New solar simulation studies have been added to Chapter 6, and market considerations have been included in the overview in Chapter 1, and in discussing industry liberalisation in Chapter 7.... |
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 |