|
The uprising
|
David Sirota |
An All-Access Pass to the Populist Insurrection Brewing Across the CountryJob outsourcing. Perpetual busy signals at government agencies. Slashed paychecks. Stolen elections. A war without end, fatal… |
OL11804089W |
|
Throwing sheep in the boardroom
|
Matthew Fraser,Matthew Fraser |
"If you want to understand why Wikipedia is changing the world, this book is a must read." --Jimmy Wales, Founder, Wikipedia "This book is a must read for all - social activists, politicians or ma… |
OL12894488W |
|
Public Key Infrastructure
|
John R Vacca |
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… |
OL15172981W |
|
The Space and Motion of Communicating Agents
|
Robin Milner |
The world is increasingly populated with interactive agents distributed in space, real or abstract. These agents can be artificial, as in computing systems that manage and monitor traffic or health; … |
OL15173168W |
|
CompTIA Security+TM All-in-One Exam Guide
|
Gregory B White |
A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-OneGet complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive reso… |
OL15173862W |
|
Network Security Bible
|
Eric Cole |
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest de… |
OL15177311W |
|
Parallel Computing on Heterogeneous Networks
|
Alexey L Lastovetsky |
* New approaches to parallel computing are being developed that make better use of the heterogeneous cluster architecture* Provides a detailed introduction to parallel computing on heterogenous clust… |
OL15179128W |
|
CompTIA A+® Complete Fast PassTM
|
Emmett Dulaney |
The CompTIA A+ exam is the industry standard in terms of measuring a technician's hardware and software knowledge, with more than 600,000 individuals certified to dateThe perfect companion to CompTIA… |
OL15184944W |
|
VANET
|
Hannes Hartenstein |
"This book provides a reference for professional automotive technologists (OEMS and suppliers), professionals in the area of Intelligent Transportation Systems, and researchers attracted to the field… |
OL15440209W |
|
Next generation mobile networks and ubiquitous computing
|
Samuel Pierre |
"This book provides a comprehensive and unified view of the latest and most innovative research findings on the many existing interactions between mobile networking, wireless communications, and ubiq… |
OL15536940W |
|
Building storage networks
|
Marc Farley |
"Plan, design, and implement network storage solutions with help from this definitive guideDevelop and design successful storage systems using this in-depth resource, now in a completely revised seco… |
OL15835068W |
|
The Well
|
Katie Hafner |
"It was the Orwellian year of 1984, when Stewart Brand, originator of the Whole Earth Catalog, and Larry Brilliant, a philanthropic doctor, created The Whole Earth 'Lectric Link, or The Well. Yet, ra… |
OL15840921W |
|
Network+ Guide to Networks
|
Tamara Dean |
Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and exciting skill. This book first introduces the fundamental building blocks that form a modern network… |
OL15922553W |
|
Computational and data grids
|
Nikolaos Preve |
"This book provide relevant theoretical frameworks covering the latest empirical research findings in the area of grid computing, with a critical perspective bridging the gap between academia and the… |
OL15932881W |
|
Privacy, intrusion detection, and response
|
Peyman Kabiri |
" This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy… |
OL15951909W |
|
Pro PHP security
|
Chris Snyder |
Provides information on securing PHP applications, covering such topics as SQL injection, XSS, remote execution, temporary files, REST services, CAPTCHAs, identity verification, and versioning. |
OL15955481W |
|
Advanced design approaches to emerging software systems
|
Xiaodong Liu,Yang Li |
"This book provides relevant theoretical frameworks and the latest empirical research findings in the area, clarifying the present chaotic and confusing literature of the current state of the art and… |
OL15991489W |
|
Auditing cloud computing
|
Ben Halpert |
"The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of … |
OL16014206W |
|
Unlocking the power of OPNET modeler
|
Zheng Lu |
"For fast, easy modeling, this practical guide provides all the essential information you need to know. A wide range of topics is covered, including custom protocols, programming in C++, External Mod… |
OL16142213W |
|
Information assurance and security technologies for risk assessment and threat management
|
Te-Shun Chou |
"This book details current trends and advances in information assurance and security, as well as explores emerging applications"--Provided by publisher. |
OL16176284W |