Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Economics of Grids, Clouds, Systems, and Services: 8th International Workshop, GECON 2011
Economics of Grids, Clouds, Systems, and Services: 8th International Workshop, GECON 2011

You are holding the proceedings of the 8th International Workshop on the Economics of Grids, Clouds, Systems, and Services. This workshop brings together the research and practitioner communities active in the area of economics and computer science to address the emerging interest in infrastructure, platform, and software services....

Change Management for Semantic Web Services
Change Management for Semantic Web Services

Software automates a wide variety of business processes in modern enterprises. Changes made to software are, in effect, changes made to the business processes themselves that govern and automate the internal and external operations of an organization.Without a proper disciplined approach to change management, enterprises lack a full...

The Global M&A Tango: How to Reconcile Cultural Differences in Mergers, Acquisitions, and Strategic Partnerships
The Global M&A Tango: How to Reconcile Cultural Differences in Mergers, Acquisitions, and Strategic Partnerships

In our rapidly expanding and increasingly volatile global economy, mergers and acquisitions are becoming the strategy of choice for businesses seeking to stimulate growth while managing risk. As more and more M&A deals are struck between global organizations, difficult new issues involving cultural differences have arisen.

In...

Sustainable On-Site CHP Systems: Design, Construction, and Operations
Sustainable On-Site CHP Systems: Design, Construction, and Operations

PROVEN TECHNIQUES FOR REDUCING ENERGY USE WITH CHP SYSTEMS

Plan, design, construct, and operate a sustainable on-site CHP (combined heat and power) facility using the detailed information in this practical guide. Sustainable On-Site CHP Systems reveals how to substantially increase the energy efficiency in commercial,...

Architecture Principles: The Cornerstones of Enterprise Architecture (The Enterprise Engineering Series)
Architecture Principles: The Cornerstones of Enterprise Architecture (The Enterprise Engineering Series)

When enterprise architects try to explain to people who are not enterprise architects what it is they do for a living, they almost invariably resort to using an analogy with the architecture of buildings, and describe enterprise architecture as a ‘kind of blueprint’. While this analogy may be helpful in conveying a general sense...

Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010

The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).

FAST aims to foster cooperation among...

Virtualizing Microsoft Tier 1 Applications with VMware vSphere 4
Virtualizing Microsoft Tier 1 Applications with VMware vSphere 4

Over the years as power costs have soared and data center space has become scarce and expensive to acquire, enterprises and small businesses have been looking for ways to decrease their data center footprints as well as reduce the overall costs of operating an IT infrastructure. As the number of different applications being deployed in...

Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms

Randomization has become a standard approach in algorithm design. Efficiency and simplicity are the main features of randomized algorithms that often made randomization a miraculous springboard for solving complex problems in various applications. Especially in the areas of communication, cryptography, data management, and discrete...

Scalability Rules: 50 Principles for Scaling Web Sites
Scalability Rules: 50 Principles for Scaling Web Sites

50 Powerful, Easy-to-Use Rules for Supporting Hypergrowth in Any Environment

 

Scalability Rules is the easy-to-use scalability primer and reference for every architect, developer, web professional, and manager. Authors Martin L. Abbott and...

How to Grow as a Photographer: Reinventing Your Career
How to Grow as a Photographer: Reinventing Your Career

Are you bored producing the same old work, but do it because it’s safe? Are corporate politics, outsourcing, or the digital revolution too much for you to handle? Has a personal tragedy caused you to reevaluate your career path?  If you answered yes to any of these questions, look no further than this inspirational guide.
...

Financial Modelling in Python (The Wiley Finance Series)
Financial Modelling in Python (The Wiley Finance Series)

"Fletcher and Gardner have created a comprehensive resource that will be of interest not only to those working in the field of finance, but also to those using numerical methods in other fields such as engineering, physics, and actuarial mathematics. By showing how to combine the high-level elegance, accessibility, and flexibility of...

Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy