Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security in Computing, Third Edition
Security in Computing, Third Edition

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer...

Alan Simpson's Windows XP Bible
Alan Simpson's Windows XP Bible
If Windows XP can do it, you can do it too ...

Windows XP is the undisputed market leader among operating systems, and the enhancements and security improvements in Service Pack 2 made it even better. So if you already know how to turn on a PC and use a mouse, here's the place to learn how to use every fabulous feature of Windows XP. Let an...

Privacy Protection for E-Services
Privacy Protection for E-Services
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material,...
Sarbanes-Oxley and Nonprofit Management: Skills, Techniques, and Methods
Sarbanes-Oxley and Nonprofit Management: Skills, Techniques, and Methods
Is your nonprofit organization ready for increased scrutiny, reporting requirements, regulations, and increased expectations from donors? This combination reference/workbook prepares you and shows you how Sarbanes-Oxley best practices can benefit your organization. It includes:
  • A structured description of Sarbanes-Oxley and its...
Understanding Digital Games
Understanding Digital Games
The aim of this book is to satisfy the need for a single accessible textbook which offers a broad introduction to the range of literatures and approaches currently contributing to digital game research. Each of the chapters outline key theoretical perspectives, theorists, and literatures to demonstrate their relevance to, and use in, the study of...
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
Nuclear Engineering Handbook (Mechanical Engineering)
Nuclear Engineering Handbook (Mechanical Engineering)

Nuclear power has, in recent years, undergone a major transformation, resulting in major technical developments and a new generation of nuclear scientists and engineers. A comprehensive book that reflects the latest nuclear technologies has been lacking—until now.

The Nuclear Engineering Handbook is a response to...

Wetlands and Water Framework Directive: Protection, Management and Climate Change (GeoPlanet: Earth and Planetary Sciences)
Wetlands and Water Framework Directive: Protection, Management and Climate Change (GeoPlanet: Earth and Planetary Sciences)

This book compares the lessons learned from a wetland-perspective approach to the changing climate and the requirements of the Water Framework Directive (WFD) with regard to environmental conservation. Examples from Germany and Poland are discussed due to the efficiency of their respective implementations of water conservation policies....

Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
Sustainable Energy Production and Consumption: Benefits, Strategies and Environmental Costing
Sustainable Energy Production and Consumption: Benefits, Strategies and Environmental Costing
This volume is a result of the NATO Advanced Research Workshop that took place in Naples, Italy on July 4 through 7 of 2007. The workshop brought together the top researchers in energy technology, energy analysis, energy economics, and environmental economics from NATO countries, partner countries and Mediterranean Action countries. The book, like...
Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere
VMware VI and vSphere SDK: Managing the VMware Infrastructure and vSphere
Virtualization is not a new concept, but it is changing the computing industry in a profound way. Server virtualization is now #1 on enterprises’ budget lists. According to analysts, it will continue to be the highest impact trend, changing infrastructure and operations through 2012.

Virtualization became popular for two reasons.
...
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy