 |
|
 E-Commerce: A Control and Security GuideOnce scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and... |  |  Network Management: Accounting and Performance StrategiesUnderstanding network performance and effectiveness is now crucial to business success. To ensure user satisfaction, both service providers and enterprise IT teams must provide service-level agreements (SLA) to the users of their networks–and then consistently deliver on those commitments. Now, two of the Cisco® leading network... |  |  Deploying Voice over Wireless LANs (Networking Technology)
The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions
Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly... |
|
|
|
 Creating Assertion-Based IP (Series on Integrated Circuits and Systems)Assertion-based IP is much more than a comprehensive set of related assertions. It is a full-fledged reusable and configurable transaction-level verification component, which is used to detect both interesting and incorrect behaviors. Upon detecting interesting or incorrect behavior, the assertion-based IP alerts other verification components... |  |  Fundamental Approaches to Software EngineeringThis book constitutes the refereed proceedings of the 7th International Conference on Fundamental Approaches to Software Engineering, FASE 2004, held in Barcelona, Spain, in March/April 2004.
The 22 revised full papers and 4 tool presentation papers presented together with an invited paper and the abstract of another invited talk were carefully... |  |  Building Trustworthy Semantic WebsSemantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. However, this improved accessibility poses a greater threat of unauthorized access, which could lead to the malicious corruption of... |
|
| Result Page: 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 |