Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Information Processing and Protection
Advances in Information Processing and Protection
This book contains a selection of the best papers given at the Advanced Computer Systems Conference in October 2006 in Poland. The book is partitioned into four topical areas:

The Artificial Intelligence section includes papers on Humatronics, Fuzzy Logic, Robotics, Cell, Genetic and Probabilistic Algorithms, Incomplete Data and Similarity...

Chemical Analysis of Contaminated Land (Sheffield Analytical Chemistry)
Chemical Analysis of Contaminated Land (Sheffield Analytical Chemistry)
This book sets out to provide a description of the chemical analysis of potentially contaminated land for all those involved in risk assessment. It is not intended as a recipe book of analytical methods. Indeed, with the wide range of techniques and options available, it would be impracticable and unnecessary to document all potential methods, and...
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results

Harness the Power of Your Most Valuable Resource—Your Workforce!

Process improvement approaches like Six Sigma and Lean Enterprise have worked wonders for countless organizations, but in the drive for true excellence, these approaches are only one important part of the formula.

Building Engaged...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)
Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)

This volume gathers the latest advances, innovations, and applications in the field of intelligent systems such as robots, cyber-physical and embedded systems, as presented by leading international researchers and engineers at the International Conference on Intelligent Technologies in Robotics (ITR), held in Moscow, Russia on...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Cryptography in C and C++
Cryptography in C and C++
  • Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
  • Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
  • Not toy code(tm), but a practical treatment of modern cryptographic...
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Modern Crop Protection Compounds
Modern Crop Protection Compounds
The leading reference on this topic has just gotten better. Building on the success of the previous two editions, all the chapters have been updated to reflect the latest developments in the field, and new chapters have been added on picolinic acids, oxathiapiprolin, flupyradifurone, and other topics.

This third edition
...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010

The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).

FAST aims to foster cooperation among...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy