 |
|
|
 Security in Computing, Third EditionSecurity in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer... |  |  Exploratory Analysis and Data Modeling in Functional Neuroimaging"All of the papers are well presented and accompanied by illustrative experimental applications. The book coverage goes beyond standard methodologies in functional neuroimaging and amounts to a highly valuable contribution to the field." -- Alfonso Nieto-Castanon, Neural Networks 18 (2005) 307-308
Functional... |  |  Mac OS X Version 10.2 Jaguar Fast & EasyRelax. Learning how to use this latest version of Mac OS X is now a breeze. With this book’s step-by-step instructions, you’ll be navigating the Mac OS X interface and customizing your Mac in no time. Begin with an introduction to Jaguar and instructions for setting up your desktop. By the time you’ve finished the book,... |
|
 Sharing Expertise: Beyond Knowledge ManagementThe field of knowledge management focuses on how organizations can most effectively store, manage, retrieve, and enlarge their intellectual properties. The repository view of knowledge management emphasizes the gathering, providing, and filtering of explicit knowledge. The information in a repository has the advantage of being easily transferable... |  |  Computer Security: Art and Science"This is an excellent text that should be read by every computer security professional and student." —Dick Kemmerer, University of California, Santa Barbara.
"This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!"
—Marvin ... |  |  Dreamweaver MX: A Beginner's GuideEssential Skills--Made Easy!
Develop and deploy Web sites with Macromedia's unique Dreamweaver MX development environment. Get a complete introduction to this popular software's tools, features, and potent functionality. Web experts Ray West and Tom Muck will lead you through all the essentials while focusing on real-world implementation. Begin... |
|
 Fuzzy Logic and Probability Applications: A Practical Guide
Probability theory and fuzzy logic are the principal components of an array of methodologies
for dealing with problems in which uncertainty and imprecision play important roles.
In relation to probability theory, fuzzy logic is a new kid on the block. As such, it has been
and continues to be, though to a lesser degree, an object of... |  |  Wireless A to ZTHE MOST PRECISE, CONCISE, AND AUTHORITATIVE WIRELESS REFERENCE AVAILABLE!
In today’s information-rich environment, a business operating without a cogent wireless communications strategy is destined for failure. That’s why, if designing, maintaining, or upgrading wireless and mobile communications systems... |  |  Scheduling in Real-Time SystemsReal-time computing plays a vital role in ultra-reliable and safety-critical applications in fields as diverse as flight control, telecommunication systems, nuclear plant supervision and surgical operation monitoring. Providing a comprehensive overview, this book examines the most significant real-time scheduling policies in use today.... |
|
Result Page: Previous 126 127 128 129 130 131 132 133 134 135 136 137 Next |