 |
|
|
|
|
 Real 802.11 Security: Wi-Fi Protected Access and 802.11i"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards." -Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
"This... |  |  The Palgrave Handbook of Philosophy and Public Policy
This book brings together a large and diverse collection of philosophical papers addressing a wide variety of public policy issues. Topics covered range from long-standing subjects of debate such as abortion, punishment, and freedom of expression, to more recent controversies such as those over gene editing, military drones, and statues ... |  |  The Disciplinary Frame: Photographic Truths and the Capture of MeaningPhotography can seem to capture reality and the eye like no other medium, commanding belief and wielding the power of proof. In some cases, a photograph itself is attributed the force of the real. How can a piece of chemically discolored paper have such potency? How does the meaning of a photograph become fixed? In The Disciplinary Frame,... |
|
 Professional Search Engine Optimization with PHP: A Developer's Guide to SEOProfessional Search Engine Optimization with PHP
Search engine optimization (SEO) is not only the job of the marketing department. It must be considered from a web site's inception and throughout its lifetime by you, the web site developer. Making changes to the architecture of a web site and modifying presentation techniques... |  |  The Photoshop Darkroom 2: Creative Digital Transformations
Back in the old days, working in a chemical
darkroom, I could only have dreamed of a postprocessing
tool as wonderful as Photoshop. But
for me that’s exactly what Photoshop is—a tool.
It’s a tool that helps me as a professional image
creator. The image is what matters, not the tool.
The Photoshop... |  |  Learning Microsoft Windows Server 2012 Dynamic Access Control
When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.
Overview
-
Understand the advantages of using Dynamic Access Control and how it...
|
|
 Programming Windows Identity Foundation (Dev - Pro)
A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with... |  |  Explorations in Information Space: Knowledge, Actor, and FirmsAs humankind seeks to extend its spatiotemporal reach both on and beyond its planet, it is constantly being forced by a recalcitrant nature to renegotiate the terms of its covenant with her. In some cases, the bargaining gets tough and nature takes offence, gradually revealing her anger with the terms that humanity seeks to impose on her through... |  |  Advances in Evolutionary Algorithms: Theory, Design and PracticeThe goal of this book is to develop efficient optimization algorithms to solve diverse real-world problems of graded difficulty. Genetic and evolutionary mechanisms have been deployed for reaching the goal.
This book has made five significant contributions in the realm of genetic and evolutionary computation (GEC).
Practical... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 |