 |
|
 Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |  |  Advances in Computer-Supported LearningThe Internet and growth of computer networks have eliminated geographic barriers, creating an environment where education can be brought to a student no matter where that student may be. The success of distance learning programs and the availability of many Web-supported applications and multimedia resources have increased the effectiveness of... |  |  |
|
|
 Design on the Edge: The Making of a High-Performance BuildingThis is the story of a small building in Ohio that was one of the first, if not the first, substantially green or high-performance buildings on a college campus. It spans the decade between 1995 and 2005. In that time, Americans impeached a president, balanced the federal budget and then unbalanced it again, witnessed the largest corporate... |  |  |  |  |
|
 Bioinformatics: An Introduction (Computational Biology)Bioinformatics is interpreted as the application of information science to biology, in which it plays a fundamental and all-pervasive role. The field continues to develop intensively in both academia and commercially, and is highly interdisciplinary. This broad-ranging and thoroughly updated second edition covers new findings while retaining the... |  |  Information Technology and the Networked Economy, Second EditionIn this text you will explore how information systems are used in business, and, more importantly, how the role of information systems has grown as a result of the telecommunications revolution.
About the Author Dr. Patrick McKeown has been at the University of Georgia since 1976. He received his... |  |  Software Verification and Analysis: An Integrated, Hands-On ApproachThis book addresses the most important techniques in improving the correctness of software, including correctness by construction (top-down refinement), program proving, static analysis and dynamic, execution-based analysis (testing and debugging).
Three major software verification techniques are discussed: Semantic program synthesis and... |
|
Result Page: 1270 1269 1268 1267 1266 1265 1264 1263 1262 1261 1260 1259 1258 1257 1256 1255 1254 1253 1252 |