 |
|
 France since 1945`a very thoughtful and stimulating analysis ... He is acute about the ways in which France today needs to change to meet the challenges of its new role in the world.' John Ardagh
The last fifty years of French history have seen immense challenges for the French: constructing a new European order, building a modern economy,... |  |  The New School of Information Security“It is about time that a book like The New School came along. The age of security as pure technology is long past, and modern practitioners need to understand the social and cognitive aspects of security if they are to be successful. Shostack and Stewart teach readers exactly what they need to know--I just wish I could... |  |  The Art of Systems Architecting, Second EditionThe only way to develop this skill is to serve an apprenticeship with a proven practitioner. However, there are simply not enough gurus to go around, and I would recommend this book both for students of the discipline and as serious reading for experienced designers who wish to recognize and maintain their expertise. -E. James in Computing... |
|
 Software Development FailuresFailed or abandoned software development projects cost the U.S. economy alone billions of dollars a year. In Software Development Failures, Kweku Ewusi-Mensah offers an empirically grounded study that suggests why these failures happen and how they can be avoided. Case studies analyzed include the well-known Confirm travel industry... |  |  |  |  |
|
 The Development and Treatment of Girlhood AggressionAfter decades of neglect, researchers have begun to focus attention on the development and outcomes of girlhood aggression. This comprehensive volume provides an account of some of the pioneering research in the field. Its central aims are to highlight current understanding, identify key components for preventing and treating the complex array of... |  |  OSSEC Host-Based Intrusion Detection GuideNovember 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,... |  |  Information and Communication Technologies in Support of the Tourism IndustryTourism is one of the leading industries worldwide. The magnitude of growth in tourism will bring both opportunities and problems to source and destination markets in years to come, especially in the internal and external exchange of information in the industry. Information and Communication Technologies in Support of the Tourism Industry... |
|
|
Result Page: 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 313 |