Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Scientific and Technical Aerospace Reports
  • Language: en
  • Pages: 488

Scientific and Technical Aerospace Reports

  • Type: Book
  • -
  • Published: 1995
  • -
  • Publisher: Unknown

Lists citations with abstracts for aerospace related reports obtained from world wide sources and announces documents that have recently been entered into the NASA Scientific and Technical Information Database.

Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices
  • Language: en
  • Pages: 341

Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices

  • Categories: Law
  • Type: Book
  • -
  • Published: 2011-09-30
  • -
  • Publisher: IGI Global

Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.

Cases on Interdisciplinary Research Trends in Science, Technology, Engineering, and Mathematics: Studies on Urban Classrooms
  • Language: en
  • Pages: 412

Cases on Interdisciplinary Research Trends in Science, Technology, Engineering, and Mathematics: Studies on Urban Classrooms

  • Type: Book
  • -
  • Published: 2012-10-31
  • -
  • Publisher: IGI Global

Involving two or more academic subjects, interdisciplinary studies aim to blend together broad perspectives, knowledge, skills, and epistemology in an educational setting. By focusing on topics or questions too broad for a single discipline to cover, these studies strive to draw connections between seemingly different fields. Cases on Interdisciplinary Research Trends in Science, Technology, Engineering, and Mathematics: Studies on Urban Classrooms presents research and information on implementing and sustaining interdisciplinary studies in science, technology, engineering, and mathematics for students and classrooms in an urban setting. This collection of research acts as a guide for researchers and professionals interested in improving learning outcomes for their students.

LDEF
  • Language: en
  • Pages: 564

LDEF

  • Type: Book
  • -
  • Published: 1995
  • -
  • Publisher: Unknown

None

United for Truth
  • Language: en
  • Pages: 336

United for Truth

United for Truth: The ACFEI story recounts the founding and the growth of the American College of Forensic Examiners Institute, the world's leading forensic science association. It includes fascinating forensic science case stories as well as profiles of leading forensic science professionals.

Handbook of Research on Threat Detection and Countermeasures in Network Security
  • Language: en
  • Pages: 450

Handbook of Research on Threat Detection and Countermeasures in Network Security

  • Type: Book
  • -
  • Published: 2014-10-31
  • -
  • Publisher: IGI Global

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.

Cloud Computing Service and Deployment Models: Layers and Management
  • Language: en
  • Pages: 389

Cloud Computing Service and Deployment Models: Layers and Management

  • Type: Book
  • -
  • Published: 2012-10-31
  • -
  • Publisher: IGI Global

"This book presents a collection of diverse perspectives on cloud computing and its vital role in all components of organizations, improving the understanding of cloud computing and tackling related concerns such as change management, security, processing approaches, and much more"--Provided by publisher.

Information Security in Diverse Computing Environments
  • Language: en
  • Pages: 380

Information Security in Diverse Computing Environments

  • Type: Book
  • -
  • Published: 2014-06-30
  • -
  • Publisher: IGI Global

"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.

Multidisciplinary Perspectives in Cryptology and Information Security
  • Language: en
  • Pages: 463

Multidisciplinary Perspectives in Cryptology and Information Security

  • Type: Book
  • -
  • Published: 2014-03-31
  • -
  • Publisher: IGI Global

With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.

Network Topology in Command and Control: Organization, Operation, and Evolution
  • Language: en
  • Pages: 350

Network Topology in Command and Control: Organization, Operation, and Evolution

  • Type: Book
  • -
  • Published: 2014-05-31
  • -
  • Publisher: IGI Global

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modeling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.