Bienvenue à la Bibliothèque Alo de l'Université Shalom de Bunia
A partir de cette page vous pouvez :
Retourner au premier écran avec les dernières notices... | Votre compte |
Détail de l'éditeur
Éditeur Auerbach Publications
Documents disponibles chez cet éditeur

![]()
document électronique
Because they provide practical machine-to-machine communication at a very low cost, the popularity of wireless sensor networks is expected to skyrocket in the next few years, duplicating the recent explosion of wireless LANs.
Wireless Se...![]()
document électronique
**The HackerÔÇÖs Handbook: The Strategy Behind Breaking Into and Defending Networks**, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. Th...![]()
document électronique
Presenting information that is current with *The Standard for Portfolio Management, *Third Edition (2013),* *this book supplies in-depth treatment of the five domains and identifies best practices to ensure the organization has a balanced portfoli...![]()
document électronique
Updated annually, the **Information Security Management Handbook, Sixth Edition, Volume 6** is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, an...![]()
document électronique
**Information Security Policies and Procedures: A PractitionerÔÇÖs Reference, Second Edition** illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of securit...![]()
document électronique
Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, **Case Studies in Intelligent Comput...![]()
document électronique
This new edition of **Risk Management: Concepts and Guidance*** *supplies a look at risk in light of current information, yet remains grounded in the history of risk practice. Taking a holistic approach, it examines risk as a blend of environmenta...![]()
document électronique
Design research promotes understanding of advanced, cutting-edge information systems through the construction and evaluation of these systems and their components. Since this method of research can produce rigorous, meaningful results in the absen...![]()
document électronique
Cooperative devices and mechanisms are increasingly important to enhance the performance of wireless communications and networks, with their ability to decrease power consumption and packet loss rate and increase system capacity, computation, and ...![]()
document électronique
Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider IT Attacks
An organizationÔÇÖs employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a syst...