|
Using the Common Criteria for IT Security Evaluation
|
Debra S Herrmann |
Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the Common Criteria (CC) for IT Security Evaluation is a relatively … |
OL15189943W |
|
Studying cell adhesion
|
A. S. G. Curtis,Pierre Bongrand |
Cell adhesion - the attachment of cells to any surface such as other cell membranes or tissues - is a complex process. In many physiological and pathological processes adhesion of a cell is the first… |
OL20781806W |
|
Longitude
|
Dava Sobel |
The dramatic human story of an epic scientific quest and of one man's forty-year obsession to find a solution to the thorniest scientific dilemma of the day--"the longitude problem."
Anyone alive … |
OL265465W |
|
Measuring market risk
|
Kevin Dowd |
This book offers an extensive and up-to-date review of market risk measurement, focusing particularly on the estimation of value at risk (VaR) and expected tail loss (ETL).Measuring Market Risk provi… |
OL2705278W |