Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Microsoft Dynamics CRM 2011 Cookbook
Microsoft Dynamics CRM 2011 Cookbook

Includes over 75 incredible recipes for deploying, configuring, and customizing your CRM application

Overview

  • Step-by-step guide to deploy Dynamics CRM 2011 components, configuring claim-based authentication and IFD deployment
  • Focus on Dynamics CRM 2011 server maintenance and optimization...
The PHP Anthology, Volume II: Applications
The PHP Anthology, Volume II: Applications
A compilation of best practice solutions to common Web Development problems in PHP, focusing on the achievement of practical goals by applying well-structured, object orientated software design principles.

Volume 2 covers the applications of PHP in the real world including authentication & access control, XML, stats & tracking, caching...

Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009
Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale...

Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Microsoft Silverlight 5 and Windows Azure Enterprise Integration
Microsoft Silverlight 5 and Windows Azure Enterprise Integration

Microsoft Silverlight is a powerful development platform for creating rich media applications and line of business applications for the web and desktop.

Microsoft Windows Azure is a cloud services operating system that serves as the development, service hosting, and service management environment for the Windows Azure platform.

...
Hyper-V Replica Essentials
Hyper-V Replica Essentials

For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.

Overview

  • A practical step-by-step guide that goes beyond theory and...
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading...
Visual Studio Lightswitch 2012
Visual Studio Lightswitch 2012

LightSwitch 2012 is included as part of the Visual Studio 2012 package. It is a rapid application deployment tool that lets power users and administrators build data-centric business applications for the desktop, cloud, and Web in just a few clicks, with no code required. The basics are very easily understood but more advanced users will...

ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework

Imagine the boost in business if you can build large, rich web applications with little code and built-in Windows authentication. With this book, you can gain skills to develop real-world applications with ASP.NET Core 2.

Key Features

  • Adopts the application-centric approach to explain core...
Secure XML: The New Syntax for Signatures and Encryption
Secure XML: The New Syntax for Signatures and Encryption

Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical...

unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy