|
Showing 1 - 25 of
414 matches in All Departments
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
|
Kepler (Paperback)
Bryant Walter William
|
R344
R326
Discovery Miles 3 260
Save R18 (5%)
|
Ships in 12 - 17 working days
|
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
This book is written for the first security hire in an
organization, either an individual moving into this role from
within the organization or hired into the role. More and more,
organizations are realizing that information security requires a
dedicated team with leadership distinct from information
technology, and often the people who are placed into those
positions have no idea where to start or how to prioritize. There
are many issues competing for their attention, standards that say
do this or do that, laws, regulations, customer demands, and no
guidance on what is actually effective. This book offers guidance
on approaches that work for how you prioritize and build a
comprehensive information security program that protects your
organization. While most books targeted at information security
professionals explore specific subjects with deep expertise, this
book explores the depth and breadth of the field. Instead of
exploring a technology such as cloud security or a technique such
as risk analysis, this book places those into the larger context of
how to meet an organization's needs, how to prioritize, and what
success looks like. Guides to the maturation of practice are
offered, along with pointers for each topic on where to go for an
in-depth exploration of each topic. Unlike more typical books on
information security that advocate a single perspective, this book
explores competing perspectives with an eye to providing the pros
and cons of the different approaches and the implications of
choices on implementation and on maturity, as often a choice on an
approach needs to change as an organization grows and matures.
This book is written for the first security hire in an
organization, either an individual moving into this role from
within the organization or hired into the role. More and more,
organizations are realizing that information security requires a
dedicated team with leadership distinct from information
technology, and often the people who are placed into those
positions have no idea where to start or how to prioritize. There
are many issues competing for their attention, standards that say
do this or do that, laws, regulations, customer demands, and no
guidance on what is actually effective. This book offers guidance
on approaches that work for how you prioritize and build a
comprehensive information security program that protects your
organization. While most books targeted at information security
professionals explore specific subjects with deep expertise, this
book explores the depth and breadth of the field. Instead of
exploring a technology such as cloud security or a technique such
as risk analysis, this book places those into the larger context of
how to meet an organization's needs, how to prioritize, and what
success looks like. Guides to the maturation of practice are
offered, along with pointers for each topic on where to go for an
in-depth exploration of each topic. Unlike more typical books on
information security that advocate a single perspective, this book
explores competing perspectives with an eye to providing the pros
and cons of the different approaches and the implications of
choices on implementation and on maturity, as often a choice on an
approach needs to change as an organization grows and matures.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Although integrating security into the design of applications has
proven to deliver resilient products, there are few books available
that provide guidance on how to incorporate security into the
design of an application. Filling this need, Security for Service
Oriented Architectures examines both application and security
architectures and illustrates the relationship between the two.
Supplying authoritative guidance on how to design distributed and
resilient applications, the book provides an overview of the
various standards that service oriented and distributed
applications leverage, including SOAP, HTML 5, SAML, XML
Encryption, XML Signature, WS-Security, and WS-SecureConversation.
It examines emerging issues of privacy and discusses how to design
applications within a secure context to facilitate the
understanding of these technologies you need to make intelligent
decisions regarding their design.This complete guide to security
for web services and SOA considers the malicious user story of the
abuses and attacks against applications as examples of how design
flaws and oversights have subverted the goals of providing
resilient business functionality. It reviews recent research on
access control for simple and conversation-based web services,
advanced digital identity management techniques, and access control
for web-based workflows. Filled with illustrative examples and
analyses of critical issues, this book provides both security and
software architects with a bridge between software and
service-oriented architectures and security architectures, with the
goal of providing a means to develop software architectures that
leverage security architectures.It is also a reliable source of
reference on Web services standards. Coverage includes the four
types of architectures, implementing and securing SOA, Web 2.0,
other SOA platforms, auditing SOAs, and defending and detecting
attacks.
In "Honest Numbers and Democracy," Walter Williams offers a
revealing history of policy analysis in the federal government and
a scorching critique of what's wrong with social policy analysis
today. Williams, a policy insider who witnessed the birth of
domestic policy analysis during the Johnson administration,
contends that the increasingly partisan U.S. political environment
is vitiating both "honest numbers" -- the data used to direct
public policy -- and, more importantly, honest analysts,
particularly in the White House.
Drawing heavily on candid off-the-record interviews with
political executives, career civil servants, elected officials and
Washington-based journalists, Williams documents the steady
deformation of social policy analysis under the pressure of
ideological politics waged by both the executive and legislative
branches. Beginning with the Reagan era and continuing into
Clinton's tenure, Williams focuses on the presidents' growing
penchant to misuse and hide numbers provided by their own analysts
to assist in major policy decisions.
"Honest Numbers and Democracy" is the first book to examine
in-depth the impact of the electronic revolution, its information
overload, and rampant public distrust of the federal government's
data on the practice of policy analysis.
A hard-hitting account of the factors threatening the
credibility of the policymaking process, this book will be required
reading for policy professionals, presidential watchers, and anyone
interested in the future of U.S. democracy.
This is a reasoned but passionate look at how Reaganism - the
political philosophy of Ronald Reagan - has severely damaged
representative democracy as created by the nation's founders.
According to Williams, Reagan and his foremost disciple George W.
Bush have created a plutocracy where the United States is no longer
a government of the people, by the people, and for the people but
is ruled by the wealthiest individuals and corporate America.
Refreshingly unafraid to point out that Reaganism's anti-government
fundamentalism stands on feet of clay, Walter Williams asks that
Americans move from their political apathy to pay attention to the
politicians and the corporations lurking behind the power curtain
to see the dangers they represent to the true essential of the
American way of life. Williams' most important contribution is his
extended analysis of the central role the key institutions - the
presidency, Congress, the federal agencies - must play for the U.S.
government to be capable in both sustaining representative
democracy and protecting the safety and economic security of the
American people. A clear result of the weakened institutions has
been the grossly inadequate homeland security effort following
September 11, and the massive corporate fraud revealed by Enron and
other large firms that robbed the nation of hundreds of billions of
dollars in stock values and depleted the pension savings of
millions of people. The initial destructive blow that damaged the
institutions of governance can be traced to Ronald Reagan and his
simplistic antigovernment philosophy that fostered rapacious
business practices and personal greed. The book also takes the
media to task, criticizing the dismal record of failing to
investigate the political and corporate chicanery that has brought
us to this pass. Keenly argued and scrupulously documented, Walter
Williams has written a stinging wake-up call to the dangers of the
demise of representative democracy and the rise of plutocracy that
American citizens can ignore only at their peril.
Although integrating security into the design of applications has
proven to deliver resilient products, there are few books available
that provide guidance on how to incorporate security into the
design of an application. Filling this need, Security for Service
Oriented Architectures examines both application and security
architectures and illustrates the relationship between the two.
Supplying authoritative guidance on how to design distributed and
resilient applications, the book provides an overview of the
various standards that service oriented and distributed
applications leverage, including SOAP, HTML 5, SAML, XML
Encryption, XML Signature, WS-Security, and WS-SecureConversation.
It examines emerging issues of privacy and discusses how to design
applications within a secure context to facilitate the
understanding of these technologies you need to make intelligent
decisions regarding their design. This complete guide to security
for web services and SOA considers the malicious user story of the
abuses and attacks against applications as examples of how design
flaws and oversights have subverted the goals of providing
resilient business functionality. It reviews recent research on
access control for simple and conversation-based web services,
advanced digital identity management techniques, and access control
for web-based workflows. Filled with illustrative examples and
analyses of critical issues, this book provides both security and
software architects with a bridge between software and
service-oriented architectures and security architectures, with the
goal of providing a means to develop software architectures that
leverage security architectures. It is also a reliable source of
reference on Web services standards. Coverage includes the four
types of architectures, implementing and securing SOA, Web 2.0,
other SOA platforms, auditing SOAs, and defending and detecting
attacks.
Blending fast-paced military science fiction and space opera, the
first volume in a dynamic trilogy from the New York Times
bestselling author of The Praxis, set in the universe of his
popular and critically acclaimed Dread Empire's Fall series-a tale
of blood, courage, adventure and battle in which the fate of an
empire rests in the hands of a cadre of desperate exiles. It's been
seven years since the end of the Naxid War. Sidelined for their
unorthodox tactics by a rigid, tradition-bound military
establishment, Captain Gareth Martinez and Captain the Lady Sula
are stewing in exile, frustrated and impatient to exercise the
effective and lethal skills they were born to use in fighting the
enemy. Yet after the ramshackle empire left by the Shaa conquerors
is shaken by a series of hammer blows that threaten the foundations
of the commonwealth, the result is a war that no one planned, no
one expected, and no one knows how to end. Now, Martinez, Sula, and
their confederate Nikki Severin must escape the clutches of their
enemies, rally the disorganized elements of the fleet, and somehow
restore the fragile peace-or face annihilation at the hands of a
vastly superior force.
"The Historical Origin Of Christianity" by Walter Williams reveals
what happened to ancient Egyptian ancestors and how the true origin
of Christianity began.
In his book "The Historical Origin Of Islam" Walter Williams
explains how the religion known as Islam developed historically.
The information presented in this book differs from the traditional
Islamic theology and literature and must be read with an open mind.
This scarce antiquarian book is a selection from Kessinger
Publishing's Legacy Reprint Series. Due to its age, it may contain
imperfections such as marks, notations, marginalia and flawed
pages. Because we believe this work is culturally important, we
have made it available as part of our commitment to protecting,
preserving, and promoting the world's literature. Kessinger
Publishing is the place to find hundreds of thousands of rare and
hard-to-find books with something of interest for everyone!
|
You may like...
Merry Christmas
Mariah Carey, Walter Afanasieff, …
CD
R122
R112
Discovery Miles 1 120
Tenet
John David Washington, Robert Pattinson
Blu-ray disc
(1)
R54
Discovery Miles 540
Midnights
Taylor Swift
CD
R418
Discovery Miles 4 180
|