Card List Article
Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection..
Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection..
Java is the foundation for virtually every type of networked application and is the global standard for developing and delivering embedded and mobile ..
A distributed database is a database in which storage devices are not all attached to a common processing unit such as the CPU, and which is controlle..
Artificial neural networks are graphical structures whose initial purpose was to emulate the human brain. They were introduced in 1943 by McCulloch an..
A multimedia system is a system capable of processing multimedia data and applications. A multimedia system is characterized by the processing, storag..
Software systems engineering is the branch of systems engineering concerned with the development of large and complex software intensive systems. This..
The need for computer and network security dates since the ?80-s of the last century. The first computer networks were local and in an academic settin..
Asymptotic algorithm analysis is a methodology which has been given a lot of attention recently. Several methods of asymptotic analysis are considered..
A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views and other objects. A data warehouse is..
Information ethics is a term used to describe the study and evaluation of the various ethical issues that arise in a world that is driven by the shari..
Microcomputer is an antiquated term that refers to a computer that uses a microprocessor for its central processing unit. This book gives an overview ..
The creation of quality software on time and within budget has been a major problem facing the software industry for several decades. Consideration of..
A software metric is a standard of measure of a degree to which a software system or process possesses some property. This book looks at the classical..
Geometric modeling is a branch of applied mathematics and computational geometry that studies methods and algorithms for the mathematical description ..
Composite material is a combination of a matrix and a reinforcement, which when combinedgives properties superior to the properties of the individual ..