|
|
|
|
|
| | How to Cheat at Securing a Wireless NetworkWireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
- Denial of service (DoS) and other network layer attacks
- Unauthorized
... | | Dynamic HTML: The Definitive Reference (2nd Edition)I am going to admit a selfish motive for writing this book and, more recently, updating it to the second edition: I needed the finished product for my own consulting and development work. After struggling in the early Version 4 browser days with tangled online references and monstrous printed versions of Netscape, Microsoft, and World Wide Web... |
|
Windows 2000 Performance GuideThe load your users place on your Windows 2000 servers may increase approximately linearly over time, but that's no guarantee that the servers' performance will degrade smoothly and predictably. Rather--and this is the crux of Windows 2000 Performance Guide--a modest increase in workload can often cause a significant, even catastrophic,... | | Lean Combustion: Technology and ControlCombustion under sufficiently fuel-lean conditions can have the desirable attributes of high efficiency and low emissions, this being particularly important in light of recent and rapid increases in the cost of fossil fuels and concerns over the links between combustion and global climate change. Lean Combustion is an eminently authoritative,... | | OpenGL(R) ES 2.0 Programming GuideOver the years, the “Red Book” has become the authoritative reference for each new version of the OpenGL API. Now we have the “Gold Book” for OpenGL ES 2.0—a cross-platform open standard ushering in a new era of shader programmability and visual sophistication for a wide variety of embedded and mobile devices, from... |
|
|
|
Result Page: 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 |