|
|
|
|
| | Terrorism Informatics: Knowledge Management and Data Mining for Homeland SecurityTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are... | | Linux Administration Handbook (2nd Edition)As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a... |
|
SharePoint 2010 How-To
Need fast, reliable, easy-to-implement solutions for SharePoint 2010? This book delivers exactly what you’re looking for: step-by-step help and guidance with the tasks that users, authors, content managers, and site managers perform most often. Fully updated to reflect SharePoint 2010’s latest improvements,... | | Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these... | | |
|
|
|
|
Result Page: 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 |