Pro Spring Boot is your authoritative hands-on practical guide for increasing your Spring Framework-based enterprise Java and cloud application productivity while decreasing development time using the
Sudoku Programming with C teaches you how to write computer programs to solve and generate Sudoku puzzles. This is a practical book that will provide you with everything you need to write your own boo
A guide to the features of Oracle Database 11g covers such topics as database administration, performance management, database security, backup and recovery, Oracle streams, storage management, applic
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile tel
This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in r
Expert Oracle SQL: Optimization, Deployment, and Statistics is about optimizing individual SQL statements, especially on production database systems. This Oracle-specific book begins by assuming you h
Pro jQuery in Oracle Application Express teaches you how to apply useful jQuery techniques to applications developed in Oracle Database’s Application Express development environment. Application Expre
This volume presents new theoretical insights, practical strategies, and policy initiatives in the rapidly evolving field of global supply chain security. As businesses, governments, and society at la
Oracle RMAN for Absolute Beginners is a gentle introduction to the use of Oracle's Recovery Manager software to make backups of an Oracle database, and to restore all or part of a database in the even
The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, inclu
Robichau delivers a practical Healthcare IT security text which discusses how to identify and access management systems; proper application design; physical and environmental safeguards; system-wide a
This book comprises an authoritative and accessible edited collection ofchapters of substantial practical and operational value. For the veryfirst time, it provides security practitioners with a trust
This book presents research into chemical, biological, radiological and nuclear (CBRN) defense and environmental security, exploring practical implications of the research. Contributions from a divers
This book presents research into chemical, biological, radiological and nuclear (CBRN) defense and environmental security, exploring practical implications of the research. Contributions from a divers
?This brief focuses on translational criminology practices as they relate to counter-terrorism and homeland security. The work provides a detailed and practical examination of how global threats (s
Expert Oracle RAC Performance Diagnostics and Tuning provides comprehensive coverage of the features, technology and principles for testing and tuning RAC databases. The book takes a deep look at opti
This work presents the evolution of the traditional concept of "national security" as military security to additionally embrace "environmental security" and then necessarily also "social (societal) se
Human security is becoming increasingly pronounced in recent years due to changes in the security landscape of world politics. Yet, inter-state relations have continued to dominate security concerns i
In response to the growing importance of power system security and reliability, Transmission Grid Security proposes a systematic and probabilistic approach for transmission grid security analysis. The
Food Security Governance in the Arctic-Barents Region provides a multidisciplinary perspective on the major food security and safety challenges faced in the Arctic region. The authors address existing
This book reviews the development of China’s social security system from 1949 onwards and analyzes its features in each stage. By emphasizing the role of the social security system in regulating incom
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics inc
This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security
This book introduces the concept of soil security and its five dimensions: Capability, Capital, Condition, Connectivity and Codification. These five dimensions make it possible to understand soil's ro
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The
This volume examines the interrelated fields of food security, energy security and sustainable agriculture as the key to a stable global agricultural platform and is arranged in six parts. The first
This book comprises 25 contributions focussed on nanotechnology for sensor applications. They stem from presentations at the NATO Advanced Research Workshop "Nanomaterials for Security"
This book studies typical issues regarding China’s financial security, such as internal and external currency security, herd behavior in bank credit, system risk in the stock market, major risks in th
This book provides international perspective for those studying or working in the security domain, from enforcement to policy. It focuses on non-traditional threats in a landscape that has been descri
Beginning NetBeans IDE is your authoritative tutorial for learning and using the open source NetBeans IDE platform backed by Oracle. Written by a NetBeans product manager at Oracle,Geertjan Wielenga s
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, se
This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the
This book draws examples from food security issues in Bangladesh. The book is structured around those issues and underlying causes of food security, the implications from different sectors, policy ana
This volume provides a systematic framework for energy suppliers, policy makers, academics, students, and all others interested in energy security, and analyzes key issues concerning energy, security
Climate Resilient Agriculture for Ensuring Food Security comprehensively deals with important aspects of climate resilient agriculture for food security using adaptation and mitigation measures. Clima
This volume examines the interrelated fields of food security, energy security and sustainable agriculture as the key to a stable global agricultural platform and is arranged in six parts. The first p
Securing privacy in the current environment is one of the great challenges of today’s democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, fro
Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the m