You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
From the author of New York Times bestsellers Easy and Breakable—a standalone novel in the Contours of the Heart series. Courage means rising up to defend your beliefs… or daring to question them. Erin McIntyre was captivating, but forbidden. His professional subordinate. The embodiment of unearned privilege. The daughter of his sworn enemy. Isaac Maat was impossible to read. Smart, ambitious, and emotionally detached. Hotter than anyone’s boss should ever be. And definitely hiding something. He told himself that getting to know her would help him take down her father. She told herself that getting under his skin would distract her wrecked heart from its misery. Neither predicted their private war would lead to an intimate battle in which the victor would be the first one to surrender.
Cell phones and Personal Digital Assistants (PDAs) have become indispensable tools for today¿s highly mobile workforce. Small and relatively inexpensive, these devices can be used not only for voice calls, simple text messages, and Personal Information Management (PIM), but also for many functions done at a desktop computer. While these devices provide productivity benefits, they also pose new risks. This document is intended to assist organizations in securing cell phones and PDAs. More specifically, this document describes in detail the threats faced by organizations that employ handheld devices and the measures that can be taken to counter those threats.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
As the Chosen One, Ash has seen some strange things and visited some strange times and places. But nothing has prepared him for this! Catapulted into the depths of space, Ash must confront the Deadites in a place where no one can hear his screams... or his chainsaw... or his boomstick! What do the forces of the evil dead want with the International Space Station? Whatever it is, Ash embarks on his most out-of-this-world adventure in order to stop them!
Information security metrics are seen as an important factor in making sound decisions about various aspects of security, ranging from the design of security architectures and controls to the effectiveness and efficiency of security operations. Security metrics strive to offer a quantitative and objective basis for security assurance. During the last few decades, researchers have made various attempts to develop measures and systems of measurement for computer security with varying degrees of success. This paper provides an overview of the security metrics area and looks at possible avenues of research that could be pursued to advance the state of the art.
An essential, in-depth analysis of the key legal issues that governments face when adopting cloud computing services.
Wavelet analysis and its applications have been one of the fastest growing research areas in the past several years. Wavelet theory has been employed in numerous fields and applications, such as signal and image processing, communication systems, biomedical imaging, radar, air acoustics, and many other areas. Active media technology is concerned with the development of autonomous computational or physical entities capable of perceiving, reasoning, adapting, learning, cooperating, and delegating in a dynamic environment.This book captures the essence of the current state of the art in wavelet analysis and active media technology. It includes nine invited papers by distinguished researchers: P Zhang, T D Bui and C Y Suen from Concordia University, Canada; N A Strelkov and V L Dol'nikov from Yaroslavl State University, Russia; Chin-Chen Chang and Ching-Yun Chang from Taiwan; S S Pandey from R D University, India; and I L Bloshanskii from Moscow State Regional University, Russia.The proceedings have been selected for coverage in:
The joint conference, ICWLHN 2002 and ICN 2002, covers a wide variety of technical sessions covering all aspects of networking technology. It features some of the world's most dynamic presenters, including leading experts such as Norman Abramson (inventor of the first access protocol ? the ALOHA protocol) and Daniel Awduche (pioneer of the MPLambdaS concept, now referred to as GMPLS). The proceedings for this joint conference is accessible to engineers, practitioners, scientists, as well as industry professionals from manufacturers to service providers.
The two-volume set LNCS 3032 and LNCS 3033 constitute the thoroughly refereed post-proceedings of the Second International Workshop on Grid and Cooperative Computing, GCC 2003, held in Shanghai, China in December 2003. The 176 full papers and 173 poster papers presented were carefully selected from a total of over 550 paper submissions during two rounds of reviewing and revision. The papers are organized in topical sections on grid applications; peer-to-peer computing; grid architectures; grid middleware and toolkits; Web security and Web services; resource management, scheduling, and monitoring; network communication and information retrieval; grid QoS; algorithms, economic models, and theoretical models of the grid; semantic grid and knowledge grid; remote data access, storage, and sharing; and computer-supported cooperative work and cooperative middleware.
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber wa...