|
|
|
|
Iris Biometric Model for Secured Network Access
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a... | | Microsoft Dynamics CRM 2011 Cookbook
Includes over 75 incredible recipes for deploying, configuring, and customizing your CRM application
Overview
-
Step-by-step guide to deploy Dynamics CRM 2011 components, configuring claim-based authentication and IFD deployment
-
Focus on Dynamics CRM 2011 server maintenance and optimization...
| | The PHP Anthology, Volume II: ApplicationsA compilation of best practice solutions to common Web Development problems in PHP, focusing on the achievement of practical goals by applying well-structured, object orientated software design principles.
Volume 2 covers the applications of PHP in the real world including authentication & access control, XML, stats & tracking, caching... |
|
|
Microsoft Silverlight 5 and Windows Azure Enterprise Integration
Microsoft Silverlight is a powerful development platform for creating rich media applications and line of business applications for the web and desktop.
Microsoft Windows Azure is a cloud services operating system that serves as the development, service hosting, and service management environment for the Windows Azure platform. ... | | Hyper-V Replica Essentials
For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.
Overview
-
A practical step-by-step guide that goes beyond theory and...
| | |
|
|
|
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 |