As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
If the life of any 20th century mathematician can be said to be a history of mathematics in his time, it is that of David Hilbert. To the enchanted young mathematicians and physicists who flocked to study with him in Goettingen before and between the World Wars, he seemed mathematics personified, the very air around him"scientifically...
The principles and concepts of survey measurement quality
Issues of survey quality have become increasingly more prominent in recent years. As more and more professionals who are not necessarily trained as survey researchers take on tasks associated with surveys, the need arises for a grounded, basic introduction to current survey methods and...
Environmental remote sensing is the measurement, from
a distance, of the spectral features of the Earth’s surface
and atmosphere. These measurements are normally
made by instruments carried by satellites or aircraft, and
are used to infer the nature and characteristics of the
land or sea surface, or of the atmosphere, at the...
This book teaches the techniques of Logic Programming through the Prolog language. The name stands for Programming in Logic. Prolog has been used for a wide variety of applications, including as the basis for a standard ‘knowledge representation language’ for the Semantic Web – the next generation of internet technology; it is one...
The use of DNA profiling in forensic cases has been considered the most innovative technique in forensic science since fingerprinting, yet for those with limited scientific knowledge, understanding DNA enough to utilize it properly can be a daunting task. Introduction to Forensic DNA Evidence for Criminal Justice Professionals is...
Crystallization from solution is a core technology in major sectors of the
chemical process and allied industries. Crystals are produced in varying sizes
ranging from as small as a few tens of nanometers to several millimetres
or more, both as discrete particles and as structured agglomerates. Well-
established examples include bulk...
Several times in my Enterprise Architecture (EA) practice, people asked me which framework shall I adopt or what are the benefits of the Zachman framework over TOGAF, etc. Others asked me to help them to define their own corporate EA framework. Before answering these types of questions, it is important to know what the differences and commonalities...
This how-to guide provides step-by-step instructions for building a Beowulf-type computer, including the physical elements that make up a clustered PC, the software required, and insights on how to organize the code to exploit parallelism.
Use of Beowulf clusters (collections of off-the-shelf commodity computers programmed to act in...
This innovative book recognizes the need within the object-oriented community for a book that goes beyond the tools and techniques of the typical methodology book. In Analysis Patterns: Reusable Object Models, Martin Fowler focuses on the end result of object-oriented analysis and design - the models themselves. He shares with...
This book is a part of ICL new book series “ICL Contribution to Landslide Disaster Risk Reduction” founded in 2019. Peer-reviewed papers submitted to the Fifth World Landslide Forum were published in six volumes of this book series. This book contains the followings:
The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...