Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems...
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...

Windows Server 2008 R2 Secrets
Windows Server 2008 R2 Secrets

Unbeatable advice and expert tips for administering, upgrading or migrating to Windows Server 2008 R2

If you're a Windows Server 2008 system administrator, this is a reference you?ll want to keep on hand. Written by a Microsoft MVP who has multiple MCITP certifications and bestselling author, this book gives you...

Deploying Linux on IBM  Pseries Clusters (IBM Redbooks)
Deploying Linux on IBM Pseries Clusters (IBM Redbooks)

For customers interested in Linux who are seeking powerful and reliable servers to support their applications, IBM® eServer pSeries® offers 64-bit POWER systems to match their requirements at lower costs. Unlike other servers supporting solely high performance Linux needs, IBM eServer pSeries provides leadership...

Operating System Concepts
Operating System Concepts
Another defining moment in the evolution of operating systems

Small footprint operating systems, such as those driving the handheld devices that the baby dinosaurs are using on the cover, are just one of the cutting-edge applications you’ll find in Silberschatz, Galvin, and Gagne’s Operating System Concepts,...

After the Genome: A Language for Our Biotechnological Future (Studies in Rhetoric & Religion)
After the Genome: A Language for Our Biotechnological Future (Studies in Rhetoric & Religion)

Biotechnological advancements during the last half-century have forced humanity to come to grips with the possibility of a post-human future. The ever-evolving opinions about how society should anticipate this biotechnological frontier demand a language that will describe our new future and discuss its ethics. After the Genome brings...

Bioactive Natural Products: Detection, Isolation, and Structural Determination, Second Edition
Bioactive Natural Products: Detection, Isolation, and Structural Determination, Second Edition

Bioactive natural products are proving to be a rich source of novel therapeutics to both protect against and combat diseases, as well as serve as lead compounds in crop protection. Following the successful format of the first edition, this volume brings together collective research from many new contributors and emphasizes the rationale...

The Coloniality of Asylum: Mobility, Autonomy and Solidarity in the Wake of Europe’s Refugee Crisis (New Politics of Autonomy)
The Coloniality of Asylum: Mobility, Autonomy and Solidarity in the Wake of Europe’s Refugee Crisis (New Politics of Autonomy)

Through the concepts of the ‘coloniality of asylum’ and ‘solidarity as method’, this book links the question of the state to the one of civil society; in so doing, it questions the idea of ‘autonomous politics’, showing how both refugee mobility and solidarity are intimately marked by the...

The Legal Protection of Databases: A Comparative Analysis
The Legal Protection of Databases: A Comparative Analysis
This book examines and compares the several types of protection available for the protection of investment in database creation. The protection of investment in making databases is not harmonized internationally. In some countries, database contents are insufficiently protected and, in others, there is too much protection. While database producers...
Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Information Assurance: Security in the Information Environment (Computer Communications and Networks)
Information Assurance: Security in the Information Environment (Computer Communications and Networks)
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare,...
Windows Server 2008 TCP/IP Protocols and Services
Windows Server 2008 TCP/IP Protocols and Services
This book is a straightforward discussion of the concepts, principles, and processes of many protocols in the TCP/IP protocol suite and how they are supported by Windows Server 2008 and Windows Vista. The focus of this book is on Internet Protocol version 4 (IPv4), referred to as Internet Protocol (IP), and associated transport and network...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy