Pro PayPal E-Commerce contains the most comprehensive collection of information on the latest PayPal technologies available. It takes the approach of PayPal as a digital money platform, and shows how it's a dynamic service that offers far more than just payment processing.
With its breadth of technologies and APIs, the PayPal platform...
Progress in space safety lies in the acceptance of safety design and engineering as an integral part of the design and implementation process for new space systems. Safety must be seen as the principle design driver of utmost importance from the outset of the design process, which is only achieved through a culture change that moves all...
Data mining has developed rapidly and has become very popular in the past two decades, but actually has
its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases.
The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In
corporate...
This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference...
Hypertension remains a leading cause of disability and death worldwide. Self-monitoring of blood pressure by patients at home is currently recommended as a valuable tool for the diagnosis and management of hypertension. Unfortunately, in clinical practice, home blood pressure monitoring is often inadequately implemented, mostly due...
With emphasis on power system protection from the network operator perspective, this classic textbook explains the fundamentals of relaying and power system phenomena including stability, protection and reliability. The fourth edition brings coverage up-to-date with important advancements in protective relaying due to significant changes in...
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Digital communications technology has immeasurably enhanced our capacity to store, retrieve, and exchange information. But who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and eminently user-friendly overview of...
Written by a team of Microsoft System Center Most Valued Professionals (MVPs), this is the ultimate guide to using Data Protection Management (DPM) to safeguard your organization's valuable information. Packed with tips and real-life solutions.
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
This book addresses the ‘three moments’ in lesbian, gay, bisexual, transgender and intersex (LGBTI) asylum seekers’ and refugees’ efforts to secure protection: The reasons for their flight, the Refugee Status Determination process, and their integration into the host community once they are recognized refugee...