|
|
|
|
|
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Information security has become a critical component in the stability and progress
of the modern world. With high expectations from the public and stringent regulations
from legislative and industry bodies, never have the pressures on corporations,
governments and other organizations been so great to protect their own data as well
as... | | Clout: The Art and Science of Influential Web Content (Voices That Matter)
The web is all about action verbs. We click. We search. We navigate. We
make choices. Alone among other forms of media, we’re the ones who control
our experience.
When organizations try to connect with their customers online, one of the
first things they always want to know is “how can we get our users to do... | | Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm
shift—intelligence is at the edge, computing is completely decentralized, and
the network is just there to knit the distributed intelligence together. Indeed,
with advancements in hardware technology, proliferation of the open source
development... |
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 |