Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of...
The Art of Agile Development
The Art of Agile Development

The Art of Agile Development contains practical guidance for anyone considering or applying agile development for building valuable software. Plenty of books describe what agile development is or why it helps software projects succeed, but very few combine information for developers, managers, testers, and customers into a single...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society is a state-of-the-art book which deals with innovative trends in communication systems, information processing, and security and trust in electronic commerce, electronic business, and electronic government. It comprises the proceedings of I3E2004, the Fourth International Conference on E-Commerce,...
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks

Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc...

The Integrity of the Judge (Law, Justice and Power)
The Integrity of the Judge (Law, Justice and Power)

There is no consensus among legal scholars on the meaning of judicial integrity, nor has legal scholarship yet seen a well-articulated discussion about the normative concept of judicial integrity. This book fills this gap by developing a theory of judicial integrity that can be applied to safeguarding mechanisms. Author Jonathan Soeharno makes...

Marketing Without Advertising: Easy Ways to Build a Business Your Customers Will Love and Recommend
Marketing Without Advertising: Easy Ways to Build a Business Your Customers Will Love and Recommend

Make your business stand out without the cost of advertising!

The best marketing you can do for your business is to concentrate on creating a high-quality operation that customers, employees and other businesspeople will trust, respect and recommend.

Marketing Without Advertising teaches small business
...

Coaching at Work: Powering your Team with Awareness, Responsibility and Trust
Coaching at Work: Powering your Team with Awareness, Responsibility and Trust

"This book comes at a time when we are asking searching questions: How exactly do we earn the loyalty, trust and commitment of our people? How do we balance the needs of our organisations to do more with less with the need to create environments in which people can grow, develop and achieve their aspirations? The answers lie within each...

Digital Image Forensics: There is More to a Picture than Meets the Eye
Digital Image Forensics: There is More to a Picture than Meets the Eye

Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical...

Cloud Computing: Web-Based Dynamic IT Services
Cloud Computing: Web-Based Dynamic IT Services

Cloud computing is on everyone’s lips: as an innovative technology, as the next generation of the Internet, as a fundamental transformation of the entire IT landscape, and as an auspicious opportunity to introduce new business ideas. But what is actually at the heart of this notion?

As a result of the multi-faceted...

Socio-Emotional Relationship Therapy: Bridging Emotion, Societal Context, and Couple Interaction (AFTA SpringerBriefs in Family Therapy)
Socio-Emotional Relationship Therapy: Bridging Emotion, Societal Context, and Couple Interaction (AFTA SpringerBriefs in Family Therapy)

This path-breaking volume introduces Socio-Emotional Relationship Therapy for clinical work with troubled couples. Practice-focused and engaging, it integrates real-world knowledge of the intersections of gender, culture, power, and identity in relationships with empirical findings on the neurobiology of attraction. Case examples detail the...

Advanced Web Services
Advanced Web Services

Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy