The future safety of maritime transportation in the United Statesa major factor in the nation's international trade and economic well-beingwill depend heavily on the quality of port and waterways information systems.
Following an earlier NRC workshop on public response to alerts and warnings delivered to mobile devices, a related workshop was held on February 28 and 29, 2012 to look at the role of social media in disaster response.
The presence and intensity of media influences television, radio, music, computers, films, videos, and the Internet are increasingly recognized as an important part of the social ecology of children and youth, and these influences have become more visible and volatile in recent decades.
In response to a mandate from Congress in conjunction with the Protection of Children from Sexual Predators Act of 1998, the Computer Science and Telecommunications Board (CSTB) and the Board on Children, Youth, and Families of the National Research Council (NRC) and the Institute of Medicine established the Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content.
"e;This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style.
The Only Book That's Completely Focused on Maximizing the Business Value of SharePoint 2010 Solutions Essential SharePoint(R) 2010 approaches Microsoft SharePoint Server 2010 from a strict business value perspective, explaining exactly how to plan and implement SharePoint solutions to achieve superior business results.
Praise for Virtual Honeypots "e;A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader's eyes.
Drawing on the findings of sector-specific workshops, e-mail surveys, research literature,expert testimony, and committee and panel members' expertise, this NationalAcademy of Engineering study assesses the qualitative impact of academic researchon five industriesnetwork systems and communications; medical devices andequipment; aerospace; transportation, distribution, and logistics services; and financialservices.
The complete guide to today's hard-to-defend chained attacks: performing them and preventing them Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "e;chained"e; exploits that integrate multiple forms of attack to achieve their goals.
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation.
Network Maintenance and Troubleshooting Guide Field-Tested Solutions for Everyday Problems, Second Edition Neal Allen The 100% practical, real-world guide to anticipating, finding, and solving network problems-fast!
In response to a mandate from Congress in conjunction with the Protection of Children from Sexual Predators Act of 1998, the Computer Science and Telecommunications Board (CSTB) and the Board on Children, Youth, and Families of the National Research Council (NRC) and the Institute of Medicine established the Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content.
"e;Microsoft Voice and Unified Communications is essential reading for anyone using-or considering-Microsoft's range of VoIP options, from consumers to small business owners to enterprise customers.
Patterns, Domain-Driven Design (DDD), and Test-Driven Development (TDD) enable architects and developers to create systems that are powerful, robust, and maintainable.
As networks, devices, and systems continue to evolve, software engineers face the unique challenge of creating reliable distributed applications within frequently changing environments.
While governments throughout the world have different approaches to how they make their public sector information (PSI) available and the terms under which the information may be reused, there appears to be a broad recognition of the importance of digital networks and PSI to the economy and to society.
"e;Charlie and Dinesh bring important skills to this project that enable them to show how LINQ works and the practical ways you can use it in your daily development process.
Using the open source Asterisk platform, you can deploy a state-of-the-art VoIP PBX on a low-cost PC or server for a fraction of the cost of conventional PBX systems.
With SharePoint 2010, developers finally have the powerful, end-to-end development tools they need to build outstanding solutions quickly and painlessly.
The Enhanced Interior Gateway Protocol (EIGRP) from Cisco Systems is one of the most widely used intra-domain routing protocols in todayis corporate networks.
In SharePoint 2003 Advanced Concepts, two world-class SharePoint consultants show how to make SharePoint "e;jump through hoops"e; for you-and do exactly what you want.
Drawing on the findings of sector-specific workshops, e-mail surveys, research literature,expert testimony, and committee and panel members' expertise, this NationalAcademy of Engineering study assesses the qualitative impact of academic researchon five industriesnetwork systems and communications; medical devices andequipment; aerospace; transportation, distribution, and logistics services; and financialservices.
Prepare for Microsoft Exam 70-342--and demonstrate your real-world mastery of advanced Microsoft Exchange Server 2013 solution design, configuration, implementation, management, and support.
The book provides a comprehensive examination of the integration of IoT technology into various industries and its impact on daily life, with a focus on the most recent advancements in the field.
Das Problem der fragmentierten IT Sicherheit: Informationssicherheit und deren Normen und Standards (BSI Grundschutz, ISO27001, weitere) sowie IT-Sicherheit (Technik und Betrieb) sollen zukünftig besser verzahnen.