|
|
Information Warfare: How to Survive Cyber Attacks"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust... | | Search Engine Optimization For Dummies (Computer/Tech)"…cuts through the nonsense, providing a clear, simple and concise explanation of how websites reach top positions in search engines ..." (PC Advisor, September 2006)
Why do some sites pop to the top when you search? How do you make yours one of them? You create sites that make search... | | Hibernate Search in ActionI joined an e-commerce company in 2000, nothing unusual I suppose. We were quite annoyed by the quality of Amazon’s search engine results compared to ours. A few years later, we reimplemented our search engine from scratch using Lucene. That’s where I learned that a good search engine is 50% kick-ass technology and 50% deep... |
|
|
The Application of Programmable DSPs in Mobile CommunicationsThis book is about two technologies that have had, and will increasingly have, a significant impact on the way we all live, learn and play: personal wireless communications and signal processing. When it comes to both markets, history has shown that reality has often surprised the most optimistic forecasters.
We draw on the experience of... | | Codes and Ciphers: Julius Caesar, the Enigma, and the Internet"He has written an excellent book that belongs in your personal library." Cryptologia
"Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet.... | | Security Engineering: A Guide to Building Dependable Distributed Systems"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier
"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,... |
|
|
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 |