Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure and Trust Computing, Data Management, and Applications: 8th FIRA International Conference
Secure and Trust Computing, Data Management, and Applications: 8th FIRA International Conference

On behalf of the Organizing Committees, it is our pleasure towelcome you to the proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application (STA 2011),which was held in Loutraki, Greece, June 28–30, 2011.

STA 2011 was the first conference after the merger of the...

Essentials of Statistics for Business and Economics (with CD-ROM)
Essentials of Statistics for Business and Economics (with CD-ROM)

Trust the latest version of this market-leading essentials text to introduce sound statistical methodology in a proven applications setting. ESSENTIALS OF STATISTICS FOR BUSINESS AND ECONOMICS, 5e, includes all of the strengths of the longer best-selling Anderson/Sweeney/Williams STATISTICS FOR BUSINESS AND ECONOMICS, with a focus on the most...

Leading Change in a Web 2.1 World: How ChangeCasting Builds Trust, Creates Understanding, and Accelerates Organizational Change (Innovations in Leadership (Hardcover))
Leading Change in a Web 2.1 World: How ChangeCasting Builds Trust, Creates Understanding, and Accelerates Organizational Change (Innovations in Leadership (Hardcover))

Recent advances in Web 2.0 technology enable new leadership processes and guidelines that can create great value for organizations. In this important new book—the first title in the new Brookings series on Innovations in Leadership—management expert Jackson Nickerson proposes a combination of processes and guidelines...

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!
Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!

Cooperation in Wireless Networks: Principles and Applications covers the underlying principles of cooperative techniques as well as several applications demonstrating the use of such techniques in practical systems. The work is written in a collaborative manner by several authors from Asia, America, and Europe. Twenty chapters introduce and...

Mastering Maya 8.5
Mastering Maya 8.5

The Ultimate Maya Resource for Intermediate to Advanced Users

Take your Maya skills to new levels with the sophisticated coverage you'll find in this authoritative Autodesk Maya Press reference and tutorial. From key basics through advanced techniques, our Maya experts provide the very latest professional-level...

Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Information Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent...
The IAF Handbook of Group Facilitation: Best Practices from the Leading Organization in Facilitation
The IAF Handbook of Group Facilitation: Best Practices from the Leading Organization in Facilitation
Sponsored by the International Association of Facilitators, The IAF Handbook of Group Facilitation offers the need-to-know basics in the field brought together by fifty leading practitioners and scholars. This indispensable resource includes successful strategies and methods, foundations, and resources for anyone who works with groups.

The IAF...

Beyond the Bottom Line: Socially Innovative Business Owners
Beyond the Bottom Line: Socially Innovative Business Owners

Quarter examines business owners who use their firms as laboratories for social innovation. After providing an introduction to this phenomenon in an historical perspective and discussing the 19th-century British industrialist Robert Owen, he provides ll case studies of contemporary innovators from six countries-the UK, US, the Netherlands,...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Wireless Network Security (Signals and Communication Technology)
Wireless Network Security (Signals and Communication Technology)
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy