 |
|
 Data Protection in a Profiled World
One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data... |  |  |  |  Developing Web Services with Apache Axis2
If you'd like to learn how to create web services (in particular, using Apache Axis2) and make some sense of various standards like SOAP, WSDL, MTOM, WS-Addressing, WS-Security, WS-Policy, XML Encryption and XML Signature, then this book is for you. Why? First, it has a tutorial style that walks you through in a step-by-step manner.... |
|
|
 Microsoft(R) SQL Server(R) 2008 Administrator's Pocket Consultant
From the author and series editor of the immensely popular ADMINISTRATOR'S POCKET CONSULTANT series from Microsoft Press®-this pocket-size guide delivers fast, accurate answers on the spot for IT professionals.
Microsoft® SQL Server® 2008 Administrator's Pocket Consultant, 2nd Edition is the... |  |  Legacy of Secrecy: The Long Shadow of the JFK Assassination
John F. Kennedy's assassination launched a frantic search to find his killers. It also launched a flurry of covert actions by Lyndon Johnson, Robert F. Kennedy, and other top officials to hide the fact that in November 1963 the United States was on the brink of invading Cuba, as part of a JFK-authorized coup. The coup plan's ... |  |  Digital Government: Technology and Public Sector Performance
Few developments have had broader consequences for the public sector than the introduction of the Internet and digital technology. In this book, Darrell West discusses how new technology is altering governmental performance, the political process, and democracy itself by improving government responsiveness and increasing information available... |
|
|
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 |