Home | Amazing | Today | Tags | Publishers | Years | Search 
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

Liferay Portal 6 Enterprise Intranets
Liferay Portal 6 Enterprise Intranets

Liferay Portal is the world's leading open-source portal platform built on Java and Web 2.0 technologies. It was designed to not only simplify your work experience but cater to your preferences and needs. With this book in hand, you will be able to solve all your Intranet development-related queries. After all, a solution shouldn't...

Cassandra: The Definitive Guide
Cassandra: The Definitive Guide

What could you do with data if scalability wasn't a problem? With this hands-on guide, you'll learn how Apache Cassandra handles hundreds of terabytes of data while remaining highly available across multiple data centers -- capabilities that have attracted Facebook, Twitter, and other data-intensive companies. Cassandra:...

The Red Gate Guide to SQL Server Team-based Development
The Red Gate Guide to SQL Server Team-based Development

Only small projects, relevant to very few people, are built by the sweat and toil of a lone developer. Larger projects, affecting whole organizations, will invariably require a team of people to design and develop the application and its storage layer, or database.

In some cases, this will mean some developers and one or two DBAs,...

Pattern Calculus: Computing with Functions and Structures
Pattern Calculus: Computing with Functions and Structures

The pattern calculus is a new foundation for computation, in which the expressive power of functions and of data structures are combined within pattern-matching functions. The best existing foundations focus on either functions, as in the lambda-calculus, or on data structures, as in Turing machines, or on compromises involving both, as in...

Formal Methods for Software Architectures: Third International School on Formal Methods for the Design of Computer
Formal Methods for Software Architectures: Third International School on Formal Methods for the Design of Computer

In the past ten years or so, software architecture has emerged as a central notion in the development of complex software systems. Software architecture is now accepted in the software engineering research and development community as a manageable and meaningful abstraction of the system under development and is applied throughout the...

Markov Random Field Modeling in Image Analysis (Advances in Pattern Recognition)
Markov Random Field Modeling in Image Analysis (Advances in Pattern Recognition)

Modeling problems in this book are addressed mainly from the computational viewpoint. The primary concerns are how to define an objective function for the optimal solution to a image analysis or computer vision problem and how to find the optimal solution. The solution is defined in an optimization sense because the perfect solution is...

Deploying Microsoft Forefront Protection 2010 for Exchange Server
Deploying Microsoft Forefront Protection 2010 for Exchange Server

When we began this project, our intent was to create a real-world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Protection for Exchange Server (FPE) 2010. We hope you find that we have achieved that goal. We’ve also included a thorough explanation of the architectural...

Decision Support: An Examination of the DSS Discipline (Annals of Information Systems)
Decision Support: An Examination of the DSS Discipline (Annals of Information Systems)

The origin of this volume came while planning the 2009 International Conference on Decision Support Systems. The theme of that 2-day conference was “Assessing Today and Envisioning Tomorrow.” We wanted to summarize where the field had been and generate ideas regarding where it was going. The meeting brought together...

Parameterized and Exact Computation: 5th International Symposium
Parameterized and Exact Computation: 5th International Symposium

The International Symposium on Parameterized and Exact Computation (IPEC, formerly IWPEC) is an international symposium series that covers research in all aspects of parameterized and exact algorithms and complexity. Started in 2004 as a biennial workshop, it became an annual event from 2008.

The four previous meetings of the...

IBM InfoSphere Replication Server and Data Event Publisher
IBM InfoSphere Replication Server and Data Event Publisher

Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many...

Google Web Toolkit 2 Application Development Cookbook
Google Web Toolkit 2 Application Development Cookbook

GWT 2 radically improves web experience for users by using existing Java tools to build no-compromise AJAX for any modern browser. It provides a solid platform so that other great libraries can be built on top of GWT. Creating web applications efficiently and making them impressive, however, is not as easy as it sounds. Writing web...

Result Page: 632 631 630 629 628 627 626 625 624 623 622 621 620 619 618 617 616 615 614 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy