|
|
|
|
|
|
Microsoft Windows Server 2008: The Complete ReferencePicture a breathtaking alpine setting, a small village nestled among the Pacific coastal mountains. Two chairs run from the base of the mountains—one to Blackcomb, one to Whistler—both offering some of the best skiing in Western Canada and a lonesome pub located at the base of both mountains, the Longhorn Saloon. Here, skiers come to... | | Fun with Algorithms: 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, ProceedingsThis volume contains the papers presented at the Fourth International Conference on Fun with Algorithms (FUN 2007), held June 3–5, 2007 in the beautiful Tuscanian coastal town of Castiglioncello, Italy.
FUN is a three-yearly conference dedicated to the use, design, and analysis of algorithms and data structures, focusing on results... | | Criminal Investigative FailuresThis topic is vitally important for not only understanding the causes and prevention of failures, but for understanding and measuring success. —John Eck, University of Cincinnati, Department of Criminal Justice
For serious crimes, criminal investigators are the gatekeepers for the rest of the criminal... |
|
Firewalls for Dummies, Second EditionGuard your DSL and protect your personal information
Keep your network safe from viruses, saboteurs, eavesdroppers, and other bad guys
We don’t want to scare you, but "they" are out there! Don’t venture into lawless cyberspace without this trusty guide. It’ll help you evaluate the danger, understand how... | | Practical Optimization: Algorithms and Engineering ApplicationsPractical Optimization: Algorithms and Engineering Applications provides a hands-on treatment of the subject of optimization. A comprehensive set of problems and exercises makes the book suitable for use in one or two semesters of a first-year graduate course or an advanced undergraduate course. Each half of the book contains a... | | Security in Wireless Ad Hoc and Sensor NetworksThis book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and... |
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |