 |
|
 SQL Server DMVs in Action: Better Queries with Dynamic Management Views
When I first discovered DMVs, I was enthralled because they made many difficult
things so easy. It was simple to identify, typically within seconds, the core performance
problems that affect SQL Server databases. For example, I could quickly
discover which queries were taking the longest time to run, which indexes were missing,
and... |  |  Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-based services (LBS) are nally coming out of research labs and getting
into the hands of nal users. It is fairly common to see cellular carriers
and private companies oering LBS to locate your children, friends, and sites
of interest, track assets, enhance the security of key personnel, help people
with disabilities use... |  |  Hacking the Human
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of... |
|
|
 Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these... |  |  |  |  Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk
with crowds of anonymous people. He sees skyscrapers and signage
extending to the horizon. There is a lot going on – people talking, walking,
playing, fighting, screaming, driving, and smiling. He sees a coffee shop
that excites his interest. He pulls... |
|
|
| Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |