Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Virtual Machine Based Mechanisms and Tools for Cyber Attack Prevention, Analysis, and Recovery
  • Language: en
  • Pages: 232
Capturing and Analyzing Internet Worms
  • Language: en
  • Pages: 318

Capturing and Analyzing Internet Worms

  • Type: Book
  • -
  • Published: 2007
  • -
  • Publisher: Unknown

None

ACM Conference on Computer and Communications Security
  • Language: en
  • Pages: 432

ACM Conference on Computer and Communications Security

  • Type: Book
  • -
  • Published: 2005
  • -
  • Publisher: Unknown

None

O gerenciamento de processos e as técnicas de tratamento de casos repetitivos
  • Language: pt-BR
  • Pages: 156

O gerenciamento de processos e as técnicas de tratamento de casos repetitivos

  • Categories: Law

O estudo propõe a análise das técnicas de gerenciamento de processos seriais reguladas pelo Código de Processo Civil de 2015 e a complementaridade dos mecanismos de tratamento de demandas e recursos repetitivos. São consideradas, para esse objetivo, as influências das técnicas estrangeiras e os aperfeiçoamentos promovidos no ordenamento processual brasileiro para atribuir maior segurança jurídica e isonomia aos pronunciamentos judiciais, de maneira célere, efetiva e uniforme. Ademais, a obra apresenta as principais características dos regimentos internos dos Tribunais Estaduais, Regionais e Superiores, assim como aspectos controvertidos na doutrina e na jurisprudência acerca do ...

Computing Handbook
  • Language: en
  • Pages: 2326

Computing Handbook

  • Type: Book
  • -
  • Published: 2014-05-07
  • -
  • Publisher: CRC Press

The first volume of this popular handbook mirrors the modern taxonomy of computer science and software engineering as described by the Association for Computing Machinery (ACM) and the IEEE Computer Society (IEEE-CS). Written by established leading experts and influential young researchers, it examines the elements involved in designing and implementing software, new areas in which computers are being used, and ways to solve computing problems. The book also explores our current understanding of software engineering and its effect on the practice of software development and the education of software professionals.

African Dynamics in a Multipolar World
  • Language: en
  • Pages: 231

African Dynamics in a Multipolar World

  • Type: Book
  • -
  • Published: 2013-05-16
  • -
  • Publisher: BRILL

Fifty years after the foundation of the OAU and the consolidation of most African states and institutions, the international panorama and Africa’s position in it have changed considerably. The world's geopolitical and economic configuration has evolved, with new actors appearing in a new period of globalization. In tone with ECAS 2013, this volume proposes that the experiences appearing in Africa question dominant paradigms in terms of political practice and academic reflection and thus offer a clear challenge to the academic community. The volume offers clues to answer questions such as: What is the impact of the current processes of globalization for African countries and African citizens? How should African Studies be engaged to gauge African dynamics, both at a local and global level? What interdisciplinary means and tools should be brought in to produce an epistemologically relevant view (or narrative) of the issues under analysis?

Twitter
  • Language: en
  • Pages: 240

Twitter

Twitter is a household name, discussed for its role in national elections, natural disasters, and political movements, as well as for what some malign as narcissistic “chatter.” The first edition of Murthy’s balanced and incisive book pioneered the study of this medium as a serious platform worthy of scholarly attention. Much has changed since Twitter’s infancy, although it is more relevant than ever to our social, political, and economic lives. This timely second edition shows how Twitter has evolved and how it is used today. Murthy introduces some of the historical context that gave birth to the platform, while providing up-to-date examples such as the #blacklivesmatter movement, and Donald Trump’s use of Twitter in the US election. The chapters on journalism and social movements have been thoroughly updated, and completely new to this edition is a chapter on celebrities and brands. Seeking to answer challenging questions around the popular medium, the second edition of Twitter is essential reading for students and scholars of digital media.

Computer Science Handbook
  • Language: en
  • Pages: 2742

Computer Science Handbook

  • Type: Book
  • -
  • Published: 2004-06-28
  • -
  • Publisher: CRC Press

When you think about how far and fast computer science has progressed in recent years, it's not hard to conclude that a seven-year old handbook may fall a little short of the kind of reference today's computer scientists, software engineers, and IT professionals need. With a broadened scope, more emphasis on applied computing, and more than 70 chap

Food Science and Technology
  • Language: en
  • Pages: 799

Food Science and Technology

This brand new comprehensive text and reference book is designed to cover all the essential elements of food science and technology, including all core aspects of major food science and technology degree programs being taught worldwide. Food Science and Technology, supported by the International Union of Food Science and Technology comprises 21 chapters, carefully written in a user-friendly style by 30 eminent industry experts, teachers and researchers from across the world. All authors are recognised experts in their respective fields, and together represent some of the world’s leading universities and international food science and technology organisations. Expertly drawn together, produ...

Cloud Computing Security
  • Language: en
  • Pages: 549

Cloud Computing Security

  • Type: Book
  • -
  • Published: 2020-11-09
  • -
  • Publisher: CRC Press

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features • Covers patching and configuration vulnerabilities of a cloud server • Evaluates methods for da...