 |
|
|
|
 Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |  |  Computer Vision: From Surfaces to 3D Objects
The typical computational approach to object understanding derives shape information from the 2D outline of the objects. For complex object structures, however, such a planar approach cannot determine object shape; the structural edges have to be encoded in terms of their full 3D spatial configuration. Computer Vision: From Surfaces... |  |  Secure Semantic Service-Oriented Systems
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is... |
|
|
| Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 |