 |
|
|
 Concurrent Programming: Algorithms, Principles, and Foundations
The advent of new architectures and computing platforms means that synchronization and concurrent computing are among the most important topics in computing science. Concurrent programs are made up of cooperating entities -- processors, processes, agents, peers, sensors -- and synchronization is the set of concepts, rules and mechanisms that... |  |  |  |  Usability Testing of Medical Devices
To paraphrase a popular saying, usability testing should be done early and often. However, it doesn’t have to be an onerous process. Informative, practical, and engaging, Usability Testing of Medical Devices provides a simple, easy to implement general understanding of usability testing. It offers a general... |
|
 Data Protection & Compliance in Context
Data Protection and Compliance in Context is a comprehensive guide which: 1.explains the content of data protection laws; 2.provides practical advice on protecting data privacy under the Data Protection Act, human rights laws and freedom of information legislation; 3.gives data controllers a platform for building compliance strategies. Data... |  |  Hacking For Dummies
Updated for Windows 8 and the latest version of Linux
The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully... |  |  Windows For Tablets For Dummies (For Dummies (Computer/Tech))
Just for you--Windows 8 from the tablet user's perspective
If you're an experienced Windows user, you don't need a guide to everything that Windows 8 can do, just to those tools and functions that work on your tablet. And so here it is. This new book zeros in on what you need to know to work best on your tablet... |
|
 Hacking Web Apps: Detecting and Preventing Web Application Security Problems
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these... |  |  Mosby's Dental Drug Reference, 10e
Ideal for chairside use by the entire dental team, Mosby's Dental Drug Reference provides guidelines for safe, accurate drug administration. More than 800 drug monographs make it easy to find indications and dosages, contraindications, interactions, side effects, serious reactions, and dental-specific drug information. With... |  |  SELinux System Administration
NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security... |
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |