Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Proven Software & Systems Requirements Engineering Techniques
"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...
BIS 2011 held in Pozna´n, Poland, was the 14th in a series of international conferences
on business information systems. The BIS conference series has been
recognized by professionals from the very beginning as a forum for the exchange
and dissemination of topical research in the development, implementation, application
and...
Risk control, capital allocation, and realistic derivative pricing and hedging are critical concerns for major financial institutions and individual traders alike. Events from the collapse of Lehman Brothers to the Greek sovereign debt crisis demonstrate the urgent and abiding need for statistical tools...
This book covers methods and strategies related to food composition and analysis. Topics include antioxidant activity of maize bran arabinoxylan microspheres; active packaging based on the release of carvacrol and thymol for fresh food; enzymes for the flavor, dairy, and baking industries; membrane technology in food processing; tenderization...
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
This is your complete, hands-on guide to saving projects in trouble.
Drawing on 20 years of frontline project management experience, Lonnie Pacelli identifies the 18 most pervasive causes of project failure: their causes, early warning signs, and how to fix them...
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.
This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...
Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.
Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...
This volume - like the N.A.T.O. Advanced Research Workshop on which it is based - addresses the fundamental science that contributes to our understanding of the potential risks from ecological terrorism, i.e. dirty bombs, atomic explosions, intentional release of radionuclides into water or air. Both effects on human health (D.N.A. and...