Book Description
Signature event context -- Summary of "Reiterating the differences"--Limited Inc a b c -- Afterword : toward an ethic of discussion.
Author : Jacques Derrida
Publisher : Northwestern University Press
Page : 169 pages
File Size : 49,56 MB
Release : 1988
Category : Philosophy
ISBN : 0810107880
Signature event context -- Summary of "Reiterating the differences"--Limited Inc a b c -- Afterword : toward an ethic of discussion.
Author : Jie Wang
Publisher : John Wiley & Sons
Page : 439 pages
File Size : 45,80 MB
Release : 2015-10-05
Category : Computers
ISBN : 1118939484
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect new developments in network security Introduces a chapter on Cloud security, a very popular and essential topic Uses everyday examples that most computer users experience to illustrate important principles and mechanisms Features a companion website with Powerpoint slides for lectures and solution manuals to selected exercise problems, available at http://www.cs.uml.edu/~wang/NetSec
Author : Vladimir Gorodetsky
Publisher : Springer
Page : 430 pages
File Size : 13,97 MB
Release : 2007-08-24
Category : Computers
ISBN : 3540739866
This book constitutes the refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, held in St. Petersburg, Russia in September 2007. Its objective was to bring together leading researchers from academia and governmental organizations as well as practitioners in the area of computer networks and information security.
Author : Matthias S. Müller
Publisher : Springer Science & Business Media
Page : 189 pages
File Size : 43,86 MB
Release : 2010-11-20
Category :
ISBN : 3642112900
As more and more hardware platforms support parallelism, parallel programming is gaining momentum. Applications can only leverage the performance of multi-core processors or graphics processing units if they are able to split a problem into smaller ones that can be solved in parallel. The challenges emerging from the development of parallel applications have led to the development of a great number of tools for debugging, performance analysis and other tasks. The proceedings of the 3rd International Workshop on Parallel Tools for High Performance Computing provide a technical overview in order to help engineers, developers and computer scientists decide which tools are best suited to enhancing their current development processes.
Author : Harry Noyes Greene
Publisher :
Page : 1344 pages
File Size : 36,86 MB
Release : 1918
Category : Law
ISBN :
Author :
Publisher : IOS Press
Page : 6097 pages
File Size : 26,92 MB
Release :
Category :
ISBN :
Author :
Publisher :
Page : 1346 pages
File Size : 44,44 MB
Release : 1918
Category : Law
ISBN :
Author : David Taniar
Publisher : Springer Science & Business Media
Page : 660 pages
File Size : 25,24 MB
Release : 2010-03-16
Category : Computers
ISBN : 3642121551
The four-volume set LNCS 6016 - 6019 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2010, held in Fukuoka, Japan, in March 2010. The four volumes contain papers presenting a wealth of original research results in the field of computational science, from foundational issues in computer science and mathematics to advanced applications in virtually all sciences making use of computational techniques. The topics of the fully refereed papers are structured according to the five major conference themes: computational methods, algorithms and scientific application, high performance computing and networks, geometric modelling, graphics and visualization, advanced and emerging applications, and information systems and technologies. Moreover, submissions from more than 30 special sessions and workshops contribute to this publication. These cover These cover topics such as geographical analysis, urban modeling, spatial statistics, wireless and ad hoc networking, logical, scientific and computational aspects of pulse phenomena in transitions, high-performance computing and information visualization, sensor network and its applications, molecular simulations structures and processes, collective evolutionary systems, software engineering processes and applications, molecular simulations structures and processes, internet communication security, security and privacy in pervasive computing environments, and mobile communications.
Author : Natalie Timms
Publisher : Cisco Press
Page : 947 pages
File Size : 42,70 MB
Release : 2014-05-08
Category : Computers
ISBN : 0133762394
CCIE Security v4.0 Practice Labs The material covered in CCIE Security v4.0 Practice Labs is designed to help candidates prepare for the CCIE Security exam by providing a complex topology and two practice labs that force problem solving, troubleshooting, and policy design using topics and equipment that are detailed in the official exam documents. Each solution is explained in detail to help reinforce a concept and topic. Tech Notes present other deployment options or enhancements and provide additional practical implementation tips. Initial and Final configuration files that can be cut and pasted onto lab devices for further testing and verification are also included. These labs serve as a practice tool for prospective CCIE Security exam candidates and, through the use of a real-world lab topology and in-depth solutions and technical notes, are also a useful reference for any security professional involved with practical customer deployments that use Cisco products and solutions.
Author : Olegas Vasilecas
Publisher : IOS Press
Page : 326 pages
File Size : 37,25 MB
Release : 2007
Category : Computers
ISBN : 1586037153
Contains papers that present original results in business modeling and enterprise engineering, database research, data engineering, data quality and data analysis, IS engineering, Web engineering, and application of AI methods.