Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Leadership by Choice: Increasing Influence and Effectiveness through Self-Management
Leadership by Choice: Increasing Influence and Effectiveness through Self-Management

Establish trust with your team by developing a clear decision-making strategy

Do you have the opportunity to focus on each decision you make? Chances are, you don't. All too often, our choices are rushed and relationships are strained by not thinking clearly or communicating properly.

We are all responsible...

Negotiation at Work: Maximize Your Team's Skills with 60 High-Impact Activities
Negotiation at Work: Maximize Your Team's Skills with 60 High-Impact Activities

Negotiation is an essential part of doing business, but to be an effective negotiator one must master a wide variety of skills such as listening, self-awareness, conflict resolution, assertiveness, and more. So it stands to reason that in order to teach such a complicated subject, managers and trainers need proven, powerful activities....

Intrusion Detection in Wireless Ad-Hoc Networks
Intrusion Detection in Wireless Ad-Hoc Networks

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including...

Explorer's Guide to the Semantic Web
Explorer's Guide to the Semantic Web
Written for developers and programmers, this guide acquaints users with the basic technologies and their interrelations that will be instrumental in the development of the Semantic Web. Key technology areas are covered, such as knowledge modeling (RDF, Topic Maps), agents (DAML, FIPA), and Trust and Authentication. This broad introduction...
Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB
Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB
As the only book to address ASP.NET 3.5, AJAX, and IIS 7 security from the developer’s point of view, this book begins with a look at the new features of IIS 7.0 and then goes on to focus on IIS 7.0 and ASP.NET 3.5 integration. You’ll walk through a detailed explanation of the request life cycle for an ASP.NET application running on IIS...
Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)
Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two...

PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
The tools and techniques for leveraging PKI technologies to provide secure Internet transactions

Do your customers have the confidence to do business over the Internet? By implementing Public Key Infrastructure (PKI) technologies, you’ll be able to quickly gain their trust through secure transactions. This book provides you with a clear...

Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach
Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach

Unlike many texts, which are organized by disease or pathogen, this unique resource presents a problem-oriented approach to the diagnosis and management of infectious diseases in children.

All chapters are organized by anatomic syndrome and guide you through each step in the management process from classifying the...

bash Cookbook: Solutions and Examples for bash Users
bash Cookbook: Solutions and Examples for bash Users

Every modern operating system has at least one shell and some have many. Some shells are command-line oriented, such as the shell discussed in this book. Others are graphical, like Windows Explorer or the Macintosh Finder. Some users will interact with the shell only long enough to launch their favorite application, and then never emerge from...

The Concise Corsini Encyclopedia of Psychology and Behavioral Science (Concise Encyclopedia of Psychology)
The Concise Corsini Encyclopedia of Psychology and Behavioral Science (Concise Encyclopedia of Psychology)

It seems like only a few short months since we co-edited The Corsini Encyclopedia of Psychology and Behavioral Science. We have now compiled the materials for the “Concise” edition of these volumes. In this edition, we have asked previous authors to update their material to reflect the most recent ideas and research findings on their...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy