 |
|
 Hardening Cisco Routers (O'Reilly Networking)
Master one single topic, and everything becomes clearer.
The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are... |  |  Data Mining in Finance: Advances in Relational and Hybrid Methods
Data Mining in Finance presents a comprehensive overview of major algorithmic approaches to predictive data mining, including statistical, neural networks, ruled-based, decision-tree, and fuzzy-logic methods, and then examines the suitability of these approaches to financial data mining. The book focuses specifically on relational data mining... |  |  Microsoft Azure: Enterprise Application Development
This fast-paced guide enables developers to design and build Enterprise applications for the cloud. You will find it easy to follow this book, as the authors use an actual online portal application for the case study. Throughout the development of the sample application there is discussion of important considerations for moving an application... |
|
 Artificial Intelligence: A Modern Approach (3rd Edition)
Artificial Intelligence (AI) is a big field, and this is a big book. We have tried to explore the full breadth of the field, which encompasses logic, probability, and continuous mathematics; perception, reasoning, learning, and action; and everything from microelectronic devices to robotic planetary explorers. The book is... |  |  |  |  Layers: The Complete Guide to Photoshop's Most Powerful Feature (2nd Edition)
In 2008, Adobe Photoshop pro and best-selling author Matt Kloskowski broke new ground teaching Photoshop by focusing on the one thing that makes Photoshop the amazing (and sometimes difficult to understand) program it is: layers. Now, Matt returns with a major update that covers layers in Photoshop CS5 in the same concise, easy to understand... |
|
 Drupal 7 First Look
Drupal 7 contains features for which site administrators have been clamoring for years, including support for fields, an improved administration interface, better database support, improved theming, and more. You could of course make a laborious search on sites, blogs, and many online tutorials that would promise to update you about every new... |  |  Data Structures and Their Algorithms
Like all engineering activities, computer programming is both craft and science. Building a bridge or a computer program requires familiarity with the known techniques for the overall design of similar artifacts. And making intelligent choices among the available techniques and designs requires understanding of the mathematical principles... |  |  Sams Teach Yourself Visual C# 2010 in 24 Hours: Complete Starter Kit
Over a decade ago, a small team of designers met in a small conference room on the second floor of Building 41 at Microsoft to create a brand-new language, C#. The guiding principles of the language emphasized simplicity, familiarity, safety, and practicality. Of course, all those principles needed to balance against one another; none are... |
|
 php|architect's Guide to Web Scraping
Today , there aremany services out there providing news feeds, and there are plenty of code libraries that can parse this data. So, with the proliferation of web services and public APIs, why is web scraping still so important to the future of the Web? It is important because of the rise ofmicroformats, Semantic Web technologies, theW3C... |  |  Security and Privacy in Mobile Information and Communication Systems
MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats... |  |  Practical Signcryption (Information Security and Cryptography)
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives... |
|
Result Page: 451 450 449 448 447 446 445 444 443 442 441 440 439 |