Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

La ley de medidas de protección integral contra la violencia de género
  • Language: es
  • Pages: 321

La ley de medidas de protección integral contra la violencia de género

  • Categories: Law

Los Cuadernos penales José María Lidón tienen un doble objetivo. Pretenden mantener viva la memoria del profesor y magistrado José María Lidón, asesinado por ETA, ya que relegarlo al olvido seria tanto como permitir que la insoportable injusticia de su muerte viniera a menos y en cierta forma, hacerse cómplice de ella. Asimismo pretenden que su memoria sea un punto de encuentro para quienes deseen cualquier profesión relacionada con el Derecho penal compartan, como compartimos con él, el anhelo por un Derecho que contribuya a crear cada vez mas amplios espacios de libertad e igualdad y a que este modo su memoria será doblemente enriquecedora.

International Joint Conferences
  • Language: en
  • Pages: 372

International Joint Conferences

None

Thinking-Based Learning
  • Language: en
  • Pages: 292

Thinking-Based Learning

  • Type: Book
  • -
  • Published: 2010-07-04
  • -
  • Publisher: Unknown

Originally published in hardcover: Norwood, MA: Christopher-Gordon Publishers, c2008.

NET Security and Cryptography
  • Language: en
  • Pages: 500

NET Security and Cryptography

Learn how to make your .NET applications secure! Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. NET Security and Cryptography is a practical and comprehensive guide to implementing both the security and the cryptography features found in the .NET platform. The authors provide numerous clear and focused examples in both C# and Visual Basic .NET, as well as detailed commentary on how the code works. They cover topics in a logical sequence and context, where they are most re...

Grid Computing Security
  • Language: en
  • Pages: 336

Grid Computing Security

Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. It discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid industry as well as students.

Security and Usability
  • Language: en
  • Pages: 741

Security and Usability

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be b...

And the Serpent Said to the Woman
  • Language: en
  • Pages: 144

And the Serpent Said to the Woman

An account of the confessions of a married woman in her mid thirties who examines every detail of her life. This book won the Euskadi Prize for Literature in Basque.

Role-based Access Control
  • Language: en
  • Pages: 344

Role-based Access Control

The authors explain role based access control (RBAC), its administrative and cost advantages, implementation issues and imigration from conventional access control methods to RBAC.

Privacy Preserving Data Mining
  • Language: en
  • Pages: 124

Privacy Preserving Data Mining

Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. Crystallizing much of the underlying foundation, the book aims to inspire further research in this new and growing area. Privacy Preserving Data Mining is intended to be accessible to industry practitioners and policy makers, to help inform future decision making and legislation, and to serve as a useful technical reference.

How Secure is Your Wireless Network?
  • Language: en
  • Pages: 224

How Secure is Your Wireless Network?

A guide to implementing a realistic, successful game plan for safe and secure wireless LANs, this volume has step-by-step guidelines and best practices for deploying secure wireless LANs in an enterprise or home environment and also within community networks.