Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Return of the Grizzly: Sharing the Range with Yellowstone's Top Predator
Return of the Grizzly: Sharing the Range with Yellowstone's Top Predator
The Yellowstone grizzly population has grown from an estimated 136 bears when first granted federal protection as a threatened species to as many as 1,000 grizzlies in a tri-state region today. No longer limited to remote wilderness areas, grizzlies now roam throughout the region—in state parks, school playgrounds, residential...
Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Mastering Windows Vista Business: Ultimate, Business, and Enterprise
Mastering Windows Vista Business: Ultimate, Business, and Enterprise
In-depth Coverage of Windows Vista Ultimate, Business, and Enterprise

Learn to install, configure, run, and troubleshoot the professional versions of Vista in this comprehensive new guide from two leading Windows authorities. From Vista's all-new interface, 32-bit/64-bit architecture, and advanced security features to its fantastic new...

Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Psychiatry today is a barren tundra, writes medical historian Edward Shorter, where drugs that don't work are used to treat diseases that don't exist. In this provocative volume, Shorter illuminates this dismal landscape, in a revealing account of why psychiatry is "losing ground" in the struggle to treat depression.

...
Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))
Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))

This volume contains the proceedings of the 8th International PhD Student Workshop on Service Life and Durability of Reinforced Concrete Structures that was held in Marne-la-Vallée, France, on September the 26th and 27th 2016.

Topics discussed in the book are related to durability performance of reinforced...

Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Architect's Portable Handbook
Architect's Portable Handbook
FROM CONCEPTION TO COMPLETION, NO ARCHITECTURAL PROJECT SHOULD PROCEED WITHOUT THIS BOOK!

Includes the new International and NFPA building codes!

When it comes to providing architects with quick, accurate guidance for a complete range of on-the-job issues, no book matches The Architect's Portable...

Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.

Cognitive networks are the future, and they are needed simply because they enable users to focus on things other...

GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
The Ethics of Research Biobanking
The Ethics of Research Biobanking
Biobanking, i.e. storage of biological samples or data emerging from such samples for diagnostic, therapeutic or research purposes, has been going on for decades. However, it is only since the mid 1990s that these activities have become the subject of considerable public attention, concern and debate. This shift in climate is due to several...
unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy