 |
|
 The Ultimate Palm RobotNo programming required--CD includes software
Now, anyone curious about robotics can inexpensively build and enjoy their very own robot using any Palm handheld for the brains. Originally developed by Carnegie Mellon University robotics department graduate students, this prototype has enjoyed a cult following among enthusiasts. Using... |  |  Securing SCADA SystemsHow to secure systems that weren't built for security
Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security... |  |  Topology Control in Wireless Ad Hoc and Sensor NetworksTopology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks.
Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting... |
|
|
 Secure Coding: Principles and PracticesDespite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &... |  |  Evaluating Project Decisions: Case Studies in Software EngineeringEffective decisions are crucial to the success of any software project, but to make better decisions you need a better decision-making process. In Evaluating Project Decisions, leading project management experts introduce an innovative decision model that helps you tailor your decision-making... |  |  |
|
|
| Result Page: 6 5 4 3 2 1 |