Perfect Passwords: Selection, Protection, Authentication User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According...
Algorithmic Aspects of Wireless Sensor Networks: Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007 This book constitutes the reviewed proceedings of the Third International Workshop on Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2007, held in Wroclaw, Poland, July 14, 2007, in association with ICALP 2007.
The 11 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 26...
More iPhone 3 Development: Tackling iPhone SDK 3 (Beginning)
Interested in iPhone development? Want to learn more? Whether you’re a self-taught iPhone development genius or have just made your way through the pages of Beginning iPhone 3 Development, we have the perfect book for you.
More iPhone 3 Development: Tackling iPhone SDK 3
digs deeper into Apple’s latest SDK....
Blender 2.5 HOTSHOT
With Blender 2.5 Hotshot you will take a tour around Blender 3D tools and discover the tight
integration between them by working on projects covering many aspects of computer image
generation, modeling, lighting, compositing, animation, and the game engine.
Using a projects based approach you will learn fun and challenging...
Writing GNU Emacs Extensions
Yes, it is possible to be all things to all people, if you're talking about the Emacs editor. As a user, you can make any kind of customization you want, from choosing the keystrokes that invoke your favorite commands to creating a whole new work environment that looks like nothing ever developed before. It's all in Emacs Lisp -- and...
|Result Page: 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 |