|
|
|
|
|
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and... | | Hunting Security BugsYour essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before... | | Practical Aspects of Interview and Interrogation-Soft CoverWhat makes a person confess to a crime he did not commit? Was he coerced? Is he trying to protect someone else? Interrogation has come under attack as opponents focus on false confessions. However, most cases are still resolved by confession, not forensic evidence. Among the new topics covered in the Second Edition of this bestselling book,... |
|
| | Flash Game Development by Example
With the Flash games market in continuous expansion, it's no surprise more and more developers are putting their efforts into the creation of Flash games. Anyway, what makes Flash games development different from other kinds of casual game development is the budget required to make it a commercial success.
There are a lot of... | | Managing and Optimizing VMware vSphere Deployments
In our experience as consultants, VMware vSphere is the most robust virtualization
solution on the market. The technology is proven and the user base is large.
Although the benefits of virtualization using vSphere are many, proper planning is
required to gain these benefits from a vSphere ... |
|
|
|
Result Page: 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 |