 |
|
 Networking Concepts and Technology : A Designer's Resource (Sun Bluprints)This book is a resource for network architects who must create solutions for emerging network environments in enterprise data centers. You'll find information on how to leverage Sun(TM) Open Network Environment (Sun ONE) technologies to create Services on Demand solutions, as well as technical details about the networking internals. The information... |  |  Colonialism in Question: Theory, Knowledge, HistoryThe burst of scholarship on colonial studies in the last two decades—crossing the disciplinary boundaries of literature, anthropology, and history—has begun to fill one of the most notable blind spots in the Western world’s examination of its history.Yet there is something strange about the timing: scholarly interest in... |  |  |
|
 Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... |  |  Dynamical Vision: ICCV 2005 and ECCV 2006 Workshops, WDV 2005 and WDV 2006, Beijing, China, October 21, 2005, Graz, Austria, May 13, 2006Classical multiple-view geometry studies the reconstruction of a static scene observed by a rigidly moving camera. However, in many real-world applications the scene may undergo much more complex dynamical changes. For instance, the scene may consist of multiple moving objects (e.g., a traffic scene) or articulated motions (e.g., a walking human)... |  |  Deadly Connections: States that Sponsor Terrorism"Dan Byman has written what will likely become the standard text on state-sponsored terrorism. Deadly Connections is an important book that not only fills a long-standing gap in the field of terrorism studies, but significantly advances our understanding of this particularly opaque and complex phenomenon." --Bruce Hoffman, author of... |
|
 Enterprise Modeling and Computing With UMLThis book is important: I will tell you why. I will also say a few words about me so that you get an idea of this person advising you on how to spend your time. Finally, I will outline my wishes about the direction I would like the future research on enterprise modeling to take.
In general terms, this book is focused on tools for the... |  |  |  |  Watermarking Systems EngineeringThe growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications presents the principles of watermarking system design and... |
|
 The Slayer's Guide To DerroThe derro have long been a mysterious race, hiding in darkness, their presence frequently but a whisper. Brought to the fore in this supplement, their culture, habitats, methods of warfare, and more are detailed in full so as to be usable by game masters and players alike.
The dwarven racesarequitediverse,but perhapsthe most deviant,... |  |  Phishing ExposedPhishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with... |  |  Mobile Commerce ApplicationsToday, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not... |
|
Result Page: 8 7 6 5 4 3 2 1 |