Exploiting Online Games: Cheating Massively Distributed Systems
If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.
From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues...
Cytokines and Chemokines in Infectious Diseases Handbook (Infectious Disease)
Cytokines and chemokines are an important class of effector molecules that play a fundamental
role in orchestrating the innate and acquired immune responses needed to eliminate or
wall off invading pathogens. In vitro and in vivo studies have been instrumental in revealing
the complexity of the cytokine network and the many facets of... Enterprise Management with SAP SEM/ Business Analytics (SAP Excellence)
In order to make strategy happen there is a need for powerful management information systems. SAP focuses on the application of modern business administration concepts, e.g. Value Based Management, the Balanced Scorecard, the Management Cockpit or flexible planning methods.
The book describes the methodology and implementation of a...
Multimedia Forensics and Security As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,... JasperReports 3.5 for Java Developers Do you want to create easily understood, professional, and powerful reports from disordered, scattered data using a free, open source Java class library? If your answer is yes, this book on JasperReports is what you are looking for. JasperReports is the world's most popular embeddable Java open source reporting library, providing Java developers...
|Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |