The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
This detailed guide for business managers describes communication technologies worldwide -- including the Internet and Web, digital mobile telephony, ISDN, SMDS, frame relay, and ATM -- and offers practical advice for selecting the most suitable technology for a particular business.
Written especially for non-technical managers in...
Metrics and Methods for Security Risk Management offers powerful analytic tools that have been absent from traditional security texts. This easy-to-read text provides a handy compendium of scientific principles that affect security threats, and establishes quantitative security metrics that facilitate the development of...
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.
Overview
Build web, client-side, desktop, and server-side...
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...
Ceramic Matrix Composites (CMCs) represent a relatively new class of quasiductile
ceramic materials. They are characterized by carbon or ceramic fi bers embedded
in ceramic matrices (oxide or non - oxide) with comparatively low bonding
forces between the fi bers and the matrix. These weak intefaces, in combination
with a porous...
This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and...
As little as two decades ago, deliberately injecting botulinum toxin into patients would have seemed foolhardy at best and criminal at worst. The increased clinical use of botulinum toxins has expanded the body of knowledge available on the structure and function of these proteins. This knowledge can be applied to topics as varied as...
The use of information technology in the public sector has been an increasingly prominent international trend. With this rapid expansion comes many issues, challenges, and concerns relating to the application of public information technology.
The Handbook of Research of Public Information Technology compiles estimable research...
The legacy of environmental catastrophe in the states of the former Soviet Union includes desertification, pollution, and the toxic aftermath of industrial accidents, the most notorious of which was the Chernobyl disaster of 1986. This book examines the development of environmental activism in Russia and the former Soviet republics in response...