 |
|
 Absolute Beginner's Guide to Building RobotsFinally, a robots book for people who don't know the first thing about robotics! Absolute Beginner's Guide to Robots is well-written, inviting, and action-packed, with engaging ideas and fascinating factoids about robots and robot-related arts and sciences. You are led gently into the... |  |  Network Query Language with CDROMLearn about an exciting new technology that is revolutionizing network and Internet content delivery
As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation... |  |  Moodle Security
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys... |
|
|
 |  |  |  |  Syngress Force 2006 Emerging Threat Analysis: From Mischief to MaliciousOver the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and... |
|
 Web Analytics For Dummies (Computers)Performing your first Web site analysis just got a whole lot easier. Web Analytics For Dummies offers everything you need to know to nail down and pump up the ROI on your Web presence. It explains how to get the stats you need, then helps you analyze and apply that information to improve traffic and click-through rate on your Web... |  |  |  |  OSSEC Host-Based Intrusion Detection GuideNovember 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,... |
|
Result Page: 4 3 2 1 |