Until late 2008, I was happy enough with Web Forms. I did recognize its weak points
and could nicely work around them with discipline and systematic application
of design principles. But a new thing called ASP.NET MVC was receiving enthusiastic
reviews by a growing subset of the ASP.NET community. So I started to...
CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...
The International Workshop on Complex Networks—CompleNet
(www.complenet.org)—was initially proposed in 2008 with the first workshop
taking place in 2009. The initiative was the result of efforts from researchers
from the Bio-Complex Laboratory in the Department of Computer Sciences at
Florida Institute of...
The idea of writing this book arose from the need to investigate the main principles of
modern power electronic control strategies, using fuzzy logic and neural networks, for
research and teaching. Primarily, the book aims to be a quick learning guide for
postgraduate/undergraduate students or design engineers interested in...
Desktop virtualization is a very broad topic, which can encompass various virtualization technologies.
This book is aimed at specifically addressing how to implement a virtual desktop infrastructure (VDI)
solution using Citrix XenDesktop.
This book is not meant as a definitive guide to any one of the technologies...
Data mining and knowledge discovery can today be considered as stable fields with
numerous efficient methods and studies that have been proposed to extract knowledge
from data. Nevertheless, the famous golden nugget is still challenging. Actually, the
context evolved since the first definition of the KDD process and knowledge has now...
Large-scale information systems in public utility services depend on computing
infrastructure. Many research efforts are being made in related areas, such as
cloud computing, sensor networks, mobile computing, high-level user interfaces
and information accesses by Web users. Government agencies in many countries
plan to launch...
You are holding the proceedings of the 8th International Workshop on the
Economics of Grids, Clouds, Systems, and Services. This workshop brings together
the research and practitioner communities active in the area of economics
and computer science to address the emerging interest in infrastructure, platform,
and software services....
This volume contains the proceedings of the 15th International conference on
Financial Cryptography and Data Security, held at the Bay Gardens Beach
Resort, St. Lucia, February 28–March 4, 2011.
Financial cryptography and data security (FC) is a well-established international
forum for research, advanced development,...
The need for compressed and coded representation and transmission of multimedia data
has not rescinded as computer processing power, storage, and network bandwidth have
increased. They have merely served to increase the demand for greater quality and
increased functionality from all elements in the multimedia delivery and consumption...
These are exciting times for those who live and work with technology every day, whether they are young people who have been using technology since birth, or, like many others, have had to adapt to it.
It is an exciting moment because in recent years there is no other example of technology that has changed our lives so...
We are delighted lo present the ECDL 2004 Conference proceedings from the
8th European Conference on Research and Advanced Technology for Digital Li-
braries at the University of Bath. Bath, UK. This followed an impressive and
geographically dispersed series of locations for previous events: Pisa (1997). ller-
aklion (1998),...