|
|
|
|
| | | | IPv6 Network ProgrammingIpv6 Network Programming contains everything you need to make your application program support IPv6. This book covers Ipv6 with a focus on two of the most timely and relevant topics: security and portability. IPv6 socket APIs (RFC2553) are fully described with real-world examples. They are implemented with security in mind, leading you to write... |
|
|
Lawyers at Work
"With probing questions and articulate answers, Cosslett and her subjects shed light on the challenges of legal practice in the current legal market." BLS Law Notes, 11.16.12
Lawyers at Work reveals what it means and what it takes to be a satisfied, sane, and successful lawyer in today’s tough... | | Research Directions in Data and Applications Security XVIIIAs Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.
Research Directions in Data and... | | Dynamic Vision for Perception and Control of MotionThe application of machine vision to autonomous vehicles is an increasingly important area of research with exciting applications in industry, defense, and transportation likely in coming decades.
Dynamic Vision for Perception and Control of Road Vehicles has been written by the world's leading expert on autonomous road-following... |
|
Games And Simulations in Online Learning: Research And Development FrameworksNearly all early learning happens during play, and new technology has added video games to the list of ways children learn interaction and new concepts. Although video games are everywhere, on Web sites, in stores, streamed to the desktop, on television, they are absent from the classroom. Computer-based simulations, a form of computer games, have... | | Android Malware (SpringerBriefs in Computer Science)
Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile... | | |
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |