Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)
An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)

Introduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally

This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments,...

Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to the problem of managing the energy demand of mobile devices. Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in mobile computing and wireless communication. The focus of this lecture is on a systems approach...
Active Directory Cookbook, 3rd Edition
Active Directory Cookbook, 3rd Edition
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
After Abu Ghraib: Exploring Human Rights in America and the Middle East (Cambridge Studies in Law and Society)
After Abu Ghraib: Exploring Human Rights in America and the Middle East (Cambridge Studies in Law and Society)
This book traverses three pivotal human rights struggles of the post-September 11th era: the American human rights campaign to challenge the Bush administration's "War on Terror" torture and detention policies, Middle Eastern efforts to challenge American human rights practices (reversing the traditional West to East flow of human rights...
Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)
Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)

The accelerated pace of European integration since the early 1990s has been accompanied by the emergence of increasingly prominent and multiform oppositions to the process. The term Euroscepticism has appeared with growing frequency in a range of political, media, and academic discourses. Yet, the label is applied to a wide range of...

Ethical and Legal Issues in Human Resource Development: Evolving Roles and Emerging Trends
Ethical and Legal Issues in Human Resource Development: Evolving Roles and Emerging Trends

This book explores the role of HRD professionals in ethical and legal decision making in the workplace. While previous books have described the need for ethics in HRD, this book presents ways that HRD scholars and professionals can influence, through collaborative relationships, effective implementation of ethical policies and legal...

Professional Apache Tomcat 5 (Programmer to Programmer)
Professional Apache Tomcat 5 (Programmer to Programmer)
The Apache Tomcat server and related technologies give Java™ developers a rich set of tools to quickly build more sophisticated Web applications. Tomcat version 5 supports the latest JSP™ and Servlet specifications, JSP 2.0, and Servlets 2.4. This completely updated volume offers you a thorough education in Tomcat 5 as well as 4.1.

...

Current Security Management & Ethical Issues of Information Technology
Current Security Management & Ethical Issues of Information Technology
This scholarly examination of the ethical issues in information technology management covers basic details such as improving user education and developing security requirements as well as more complicated and far-reaching problems.

Corporate and individual behaviors are increasingly publicized as reports of scandals around the world are...

Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications
  • Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
  • Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
  • ...
unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy