 |
|
 Hacker Debugging Uncovered (Uncovered series)Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of... |  |  Trustworthy Computing: Analytical and Quantitative Engineering Evaluation"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."
... |  |  Doing Business in 2004: Understanding RegulationA vibrant private sector—with firms making investments, creating jobs, and improving productivity— promotes growth and expands opportunities for poor people. To create one, governments around the world have implemented wide-ranging reforms, including macro-stabilization programs, price liberalization, privatization, and trade-barrier... |
|
 Reconfigurable Computing: Architecture, Tools, and Applications: 4th International Workshop, ARC 2008, London, UK, March 26-28, 2008, ProceedingsThis book constitutes the refereed proceedings of the 4th International Workshop on Applied Reconfigurable Computing, ARC 2008, held in London, UK, in March 2008.
The 21 full papers and 14 short papers presented together with the abstracts of 3 keynote lectures were carefully reviewed and selected from 56 submissions. The papers are organized... |  |  Automated Reasoning: 4th International Joint Conference, IJCAR 2008, Sydney, NSW, Australia, August 12-15, 2008, ProceedingsThis book constitutes the refereed proceedings of the 4th International Joint Conference on Automated Reasoning, IJCAR 2008, held in Sydney, Australia, in August 2008. The 26 revised full research papers and 13 revised system descriptions presented together with 4 invited papers and a summary of the CASC-J4 systems competition were carefully... |  |  Information Assurance ArchitectureSafeguard Your Organization’s Information!
Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information... |
|
|
 Building A Global Information Assurance ProgramGovernments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are... |  |  |  |  Sacred Geometry: Philosophy and Practice (Art and Imagination)About the Art & Imagination Series: Explore a range of interests, philosophies, religions, and cultures—from Kabbalah to Freemasonry, Buddhism to Hinduism, myth to magic. The distinguished authors bring a wealth of knowledge, visionary thinking, and accessible writing to each intriguing subject in these lavishly... |
|
Result Page: 818 817 816 815 814 813 812 811 810 809 808 807 806 805 804 803 802 801 800 |