 |
|
|
|
 The History of Information Security: A Comprehensive Handbook
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
... |  |  Learn cocos2d 2: Game Development for iOS
Have you ever imagined yourself writing a computer game and being able to make money selling
it? With Apple’s iTunes App Store and the accompanying mobile iPhone, iPod touch, and iPad
devices, doing that is now easier than ever. Of course, that doesn’t mean it’s easy—there’s still
a lot to learn about... |  |  Pro SQL Server 2012 BI Solutions (Professional Apress)
Business intelligence projects do not need to cost multi-millions of dollars or take months or even years to complete! Using rapid application development (RAD) techniques along with Microsoft SQL Server 2012, this book guides database administrators, SQL programmers, and report specialists in creating practical, cost-effective business... |
|
 |  |  International Symposium on History of Machines and Mechanisms (Hmm Symposium)
The HMM2004 International Symposium on History of Machines and Mechanisms is
the second event of a series that has been started in 2000 as main activity of the
IFToMM Permanent Commission for History of MMS, Mechanism and Machine
Science. The aim of the HMM Symposium is to be a forum to exchange views,
opinions, and experiences... |  |  Nanostructure control of materials
The World is confronted with a plethora of potentially disruptive technologies
– some, such as nanotechnology, will inevitably challenge our cherished
social, economic and industrial stability over the next two decades. Rational
design and manufacture of materials properties through nanostructure control
will profoundly... |
|
| Result Page: 806 805 804 803 802 801 800 799 798 797 796 795 794 793 792 791 790 789 788 |