National security strategist and former FBI counterintelligence operative Eric O’Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and wallet, and arms you with his……続きを見る
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different o……続きを見る
Dieses Methodenhandbuch für effektives IT_Notfallmanagement bietet praxisnahe Methoden und Lösungen, um Unternehmen auf IT-Notfälle vorzubereiten und diese erfolgreich zu bewältigen. Es basiert auf ……続きを見る
La cuestión del futuro del trabajo está presente hace años en todos los foros en los que se discuten temas de relevancia global. No es un tema nuevo. Hace mucho tiempo que se viene hablando de la am……続きを見る
A paradigm shift is taking place in computer science: one generation ago, we learned to abstract from hardware to software, now we are abstracting from software to serviceware implemented through se……続きを見る
著者:Federico Rajola
出版社: Springer Berlin Heidelberg
発売日: 2016年05月23日
An integrated view of IT and business processes through extended IT governance allows financial institutions to innovate operations which improve business and organizational performance. However, fi……続きを見る
著者:Federico Ferretti
出版社: Springer International Publishing
発売日: 2016年03月24日
The legitimacy or illegitimacy of information exchanges between competitors remains a topical debate with regard to EU competition law and policy. This book reexamines the issue in the retail financ……続きを見る