
ilość książek w kategorii: 5022
![]() |
Underwriting the Internet: How Technical Advances, Financial Engineering, and Entrepreneurial Genius Are Building the Information Highway
ISBN: 9780765615183 / Angielski / Miękka / 2004 / 297 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Filled with fascinating glimpses behind today's financial headlines, Underwriting the Internet is a fast-paced story of one of the most exciting industrial developments that has ever occurred. This comprehensive treatment of the technical advances, financial engineering, and entrepreneurial genius behind the Internet revolution includes actual corporate case studies, stock market analyses, and synopses of regulatory investigations. While focusing on the Internet's commercial development, the author describes the little understood technical and financial areas of the Internet revolution. He...
Filled with fascinating glimpses behind today's financial headlines, Underwriting the Internet is a fast-paced story of one of the most exciting indus...
|
cena:
199,94 |
![]() |
Web Search Savvy: Strategies and Shortcuts for Online Research
ISBN: 9780805838602 / Angielski / Miękka / 2004 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Web Search Savvy: Strategies and Shortcuts for Online Research provides readers of all skill levels with efficient search strategies for locating, retrieving, and evaluating information on the Internet. Utilizing her experience as a reporter working on deadline, author Barbara G. Friedman offers the most effective methods for finding useful and trustworthy data online, and presents these techniques in a straightforward, user-friendly manner.
Anyone who uses the Internet for research will find much of value here, including techniques that harness the power of advanced searches to... Web Search Savvy: Strategies and Shortcuts for Online Research provides readers of all skill levels with efficient search strategies for locati...
|
cena:
199,94 |
![]() |
Information Management: An Informing Approach
ISBN: 9780415552158 / Angielski / Miękka / 2009 / 174 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information and its management is central to modern society. Organizations - private and public, national and international - have recognized that information is a key resource and that its management is critical for success.
Existing books on information management focus on the abilities of computers to process data, the development of information systems, and the management of IT resources. They often start with the computer as a key issue. Although Information Management acknowledges the importance of computers and data communication, it starts from a deeper... Information and its management is central to modern society. Organizations - private and public, national and international - have recognized that ... |
cena:
199,94 |
![]() |
Event Mining for Explanatory Modeling
ISBN: 9781450384827 / Angielski / Twarda / 2021 / 162 str. Termin realizacji zamówienia: ok. 22 dni roboczych. |
cena:
199,99 |
![]() |
Security in Cyberspace: Targeting Nations, Infrastructures, Individuals
ISBN: 9781501317293 / Angielski / Miękka / 2016 / 264 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences.... Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but m... |
cena:
200,19 |
![]() |
The Network Security Test Lab: A Step-by-Step Guide
ISBN: 9781118987056 / Angielski / Miękka / 2015 / 480 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The ultimate hands-on guide to IT security and proactive defense
The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers... The ultimate hands-on guide to IT security and proactive defense
The Network Security Test Lab is a hands-on, step-by-step guide to u... |
cena:
200,25 |
![]() |
High Performance Memory Systems
ISBN: 9780387003108 / Angielski / Twarda / 2003 / 297 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The State of Memory Technology Over the past decade there has been rapid growth in the speed of micropro cessors. CPU speeds are approximately doubling every eighteen months, while main memory speed doubles about every ten years. The International Tech nology Roadmap for Semiconductors (ITRS) study suggests that memory will remain on its current growth path. The ITRS short-and long-term targets indicate continued scaling improvements at about the current rate by 2016. This translates to bit densities increasing at two times every two years until the introduction of 8 gigabit dynamic random...
The State of Memory Technology Over the past decade there has been rapid growth in the speed of micropro cessors. CPU speeds are approximately doublin...
|
cena:
201,24 |
![]() |
Cryptographic Hardware and Embedded Systems - Ches 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings
ISBN: 9783540747345 / Angielski / Miękka / 2007 / 488 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. CHES2007, theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10-13, 2007. The workshop - ceived 99 submissions from 24 countries, of which the Program Committee (39 members from 15 countries) selected 31 for presentation. For the ?rst time in the history of CHES, each submission was reviewed by at least four reviewers instead of three (and at least ?ve for submissions by PC members, those now being limited to two per member) and many submitted papers have received...
CHES2007, theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) an...
|
cena:
201,24 |
![]() |
Patient Care Information Systems: Successful Design and Implementation
ISBN: 9780387942551 / Angielski / Twarda / 1994 / 218 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In the current era of health care reform, the pressures to truly manage patient care and to build effective integrated delivery systems are generating intense interest in patient care information systems. Health care institutions cannot provide seamlees access to care without seamless access to information, and they cannot manage and improve care without improved information management. Patient Care Information Systems examines how to design and implement these systems so they successfully meet the needs of physicians, nurses, and other health care providers. In one convenient...
In the current era of health care reform, the pressures to truly manage patient care and to build effective integrated delivery systems are generating...
|
cena:
201,24 |
![]() |
Network Security Assessment 3e
ISBN: 9781491910955 / Angielski / Miękka / 2017 / 494 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities, and the steps you can take to identify them in your environment. System complexity and attack surfaces continue to grow. This book provides a process to help you mitigate risks posed to your network. Each chapter includes a checklist summarizing... How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. W... |
cena:
201,24 |
![]() |
Secure By Design
ISBN: 9781617294358 / Angielski / Miękka / 2019 / 410 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Teaching developers how to use design to drive security in software development, this resource is full of patterns, best practices, and mindsets to directly apply to real-world development.
Teaching developers how to use design to drive security in software development, this resource is full of patterns, best practices, and mindsets to di...
|
cena:
201,24 |
![]() |
Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th Intern
ISBN: 9783031155550 / Angielski / Miękka / 2022 / 201 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16-18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows: computational intelligence; cyber security; and computational models.
This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16-18, 2021. The 14 ...
|
cena:
201,24 |
![]() |
Trends in Data Protection and Encryption Technologies
ISBN: 9783031333859 / Angielski / Twarda / 2023 Termin realizacji zamówienia: ok. 16-18 dni roboczych. This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors.
Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints... This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption a...
|
cena:
201,24 |
![]() |
VLSI-SoC: Technology Advancement on SoC Design
ISBN: 9783031168208 / Angielski / Miękka / 2023 Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, held in Singapore, in October 2021*. The 12 full papers included in this volume were carefully reviewed and selected from the 44 papers (out of 75 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging... This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Sca...
|
cena:
201,24 |
![]() |
Security and Privacy in Social Networks and Big Data
ISBN: 9789819951765 / Angielski / Miękka / 2023 Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book constitutes the proceedings of the 9th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2023, which took place in Canterbury, UK, in August 2023. The 10 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections as follows: information abuse and political discourse; attacks; social structure and community; and security and privacy matters. Papers "Data Reconstruction Attack Against Principal...
This book constitutes the proceedings of the 9th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2023,...
|
cena:
201,24 |
![]() |
Online Capacity Provisioning for Energy-Efficient Datacenters
ISBN: 9783031115516 / Angielski / Miękka / 2023 Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book addresses the urgent issue of massive and inefficient energy consumption by data centers, which have become the largest co-located computing systems in the world and process trillions of megabytes of data every second. Dynamic provisioning algorithms have the potential to be the most viable and convenient of approaches to reducing data center energy consumption by turning off unnecessary servers, but they incur additional costs from being unable to properly predict future workload demands that have only recently been mitigated by advances in machine-learned...
This book addresses the urgent issue of massive and inefficient energy consumption by data centers, which have become the largest co-located comp...
|
cena:
201,24 |
![]() |
Secure Voice Processing Systems against Malicious Voice Attacks
ISBN: 9783031447471 / Angielski / Miękka / 2023 Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes. First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum... This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods... |
cena:
201,24 |
![]() |
Cryptocoding Based on Quasigroups
ISBN: 9783031501241 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
201,24 |
![]() |
Real-Time Database Systems
ISBN: 9783031442292 / Angielski / Miękka / 2023 Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides an overview of both experimental and commercial real-time database systems (RTDBs) and a systematic approach to understanding, designing, and implementing them. To this end, the book is composed of four chapters: Chapter 1 “An Overview of Real-Time Database Systems” delves into the realm of RTDBs and discusses the specific requirements, transaction models, and scheduling algorithms that set RTDBs apart from conventional DBMs. Chapter 2 on “Experimental Real-Time Databases” presents various experimental RTDBs developed in academia with their architectures,... This book provides an overview of both experimental and commercial real-time database systems (RTDBs) and a systematic approach to understanding, d... |
cena:
201,24 |
![]() |
The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects
ISBN: 9783031541575 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
201,24 |