Significant advances in the treatment of patients with
cancer have occurred over the last decade, as evidenced
by steadily improving cure rates and extended durations
of survival. There is often a critical trade-off, however,
because more intense cytotoxic regimens may result in
increased adverse events, including an...
This innovative monograph explores a new mathematical formalism in higher-order temporal logic for proving properties about the behavior of systems. Developed by the authors, the goal of this novel approach is to explain what occurs when multiple, distinct system components interact by using a category-theoretic description of behavior...
This book describes reliable and efficient design automation techniques for the design and implementation of an approximate computing system. The authors address the important facets of approximate computing hardware design - from formal verification and error guarantees to synthesis and test of approximation systems. They provide...
This book’s primary goal is to help you prepare to take and pass Microsoft’s exam number 70-290, Managing and Maintaining a Microsoft Windows Server 2003 Environment. Our secondary purpose in writing this book is to provide exam candidates with knowledge and skills that go beyond the minimum requirements for passing the...
The second edition of the best-selling PostgreSQL has been updated to completely cover new features and capabilities of the 8.0 version of PostgreSQL. You will be lead through the internals of the powerful PostgreSQL open source database chapter, offering an easy-to-read, code-based approach...
.NET System Management Services is a detailed and practical overview of the enterprise system management facilities, available as part of the Framework Class Library (FCL) of the .NET Framework. While Windows Management Instrumentation (WMI), which is a centerpiece of Microsoft's enterprise management technology, is a fairly well...
This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.
We present the chapters in the same chronological order that the system administrator...
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...