|
|
|
|
| | Web Services : Theory and PracticeWeb Services describes a pivotal application enabling technology that takes reusable object technology to new heights and then marries it with the Web. Web services impact everything to do with applications—including applications that enterprises already own. However, there is a preponderance of confusion and misunderstanding... | | Digital Evidence and Computer Crime, Second EditionDigital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an... |
|
Fundamentals of Switching Theory and Logic Design: A Hands on ApproachInformation Science and Digital Technology form an immensely complex and wide subject that extends from social implications of technological development to deep mathematical foundations of the techniques that make this development possible. This puts very high demands on the education of computer science and engineering. To be... | | Microsoft SharePoint 2007 Technologies: Planning, Design and ImplementationMicrosoft SharePoint 2007 Technologies: Planning, Design and Implementation provides an in-depth examination of the tasks involved in planning, designing and deploying SharePoint in your enterprise. SharePoint 2007 significantly extends the breadth of capabilities for end users, administrators, developers, and designers. The cutting-edge... | | Create Your Own DVDsI set out to write this book for one simple reason: I want you to have fun making your own movies with your camcorder and your PC. I want to help you get up to speed so that you can easily create movies that your friends and family will actually watch.
Although the title of this book might suggest that it is strictly for people who want... |
|
Cybersecurity Operations HandbookCybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity... | | Wireless Communications Security (Artech House Universal Personal Communications)Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography... | | |
|
|
|
Result Page: 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 |