Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive...
Application Acceleration and WAN Optimization Fundamentals
Application Acceleration and WAN Optimization Fundamentals
IT organizations face a number of increasing pressures to increase productivity, improve application performance, provide infrastructure conducive to global collaboration, improve posture toward data protection and compliance, and minimize costs across the board. These pressures come largely as a result of initiatives to increase availability and...
Atoms, Radiation, and Radiation Protection (Physics Textbook)
Atoms, Radiation, and Radiation Protection (Physics Textbook)
Since the preparation of the second edition (1995) of Atoms, Radiation, and Radiation Protection, many important developments have taken place that affect the profession of radiological health protection. The International Commission on Radiological Protection (ICRP) has issued new documents in a number of areas that are addressed in this third...
Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges
Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges

This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating...

Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences
Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences
This book is directed to academics, educators, and government policy-makers who are concerned about addressing emerging cyber-bullying and anti-authority student expressions through the use of cell phone and Internet technologies. There is a current policy vacuum relating to the extent of educators' legal responsibilities to intervene when such...
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems

This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overview of the fundamental principles and...

Geeks On Call Security and Privacy: 5-Minute Fixes
Geeks On Call Security and Privacy: 5-Minute Fixes
Bringing order to the lawless frontier

Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To this lawless high-tech frontier comes the cavalry, mounted on (or in) blue PT Cruisers—Geeks On Call. Now they're...

Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

Process Engineering and Design Using Visual Basic
Process Engineering and Design Using Visual Basic
Software tools are a great aid to process engineers, but too much dependence on such tools can often lead to inappropriate and suboptimal designs. Reliance on software is also a hindrance without a firm understanding of the principles underlying its operation, since users are still responsible for devising the design. In Process Engineering and...
Basics of Contemporary Cryptography for IT Practitioners
Basics of Contemporary Cryptography for IT Practitioners
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
Handbook of Emergency Response to Toxic Chemical Releases: A Guide to Compliance
Handbook of Emergency Response to Toxic Chemical Releases: A Guide to Compliance
This handbook has been prepared as a working reference for the safety officer, the environmental engineer and the consultant. For the safety officer, this handbook provides detailed guidelines and instructions in preparing Right-to- Know Reporting Audits, establishing programs and training employees on hazard awareness, and...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy