 |
|
 |  |  |  |  Computer Viruses and Other Malicious Software: A Threat to the Internet EconomyMalware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents... |
|
 Elementary Real and Complex Analysis (Dover Books on Mathematics)Excellent undergraduate-level text offers coverage of real numbers, sets, metric spaces, limits, continuous functions, series, the derivative, higher derivatives, the integral and more. Each chapter contains a problem set (hints and answers at the end), while a wealth of examples and applications are found throughout the text. Over 340 theorems... |  |  Online Assessment And Measurement: Foundations And ChallengesOnline learning is one of the most important topics in distance learning, but practitioners and researchers have experienced difficulty in defining the process. Online Assessment and Measurement: Foundations and Challenges approaches the topic by finding a common ground to properly analyze online assessment and measurement. Online Assessment... |  |  The Essential Guide to Flash CS4 with ActionScriptFor any professional designer or developer working in the world of web technologies or multimedia, Flash is the must-have application, and knowing how to use it effectively is vital. Add in ActionScript 3.0, and Flash becomes an even more powerful tool for the development of high-performance web applications.
The Essential Guide to Flash... |
|
|
 Developing Web Applications with Visual Basic. NET and ASP.NETJohn Alexander and bestselling author Billy Hollis show programmers how to develop enterprise-level Web applications using Microsoft's popular programming language--Visual Basic.NET. * Features the incomparable insights and programming know-how of two popular Microsoft insiders, arming developers with proven tips and workarounds to... |  |  |  |  Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |
|
Result Page: 1392 1391 1390 1389 1388 1387 1386 1385 1384 1383 1382 1381 1380 1379 1378 1377 1376 1375 1374 |