|
|
|
|
Botnets: The Killer Web AppThis is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world... | | GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
The fourth edition of the International Conference on Geospatial Semantics
(GeoS 2011) was held in Brest, France, during May 12–13, 2011.
Geospatial semantics (GEOS) is an emerging research area in the domain of
geographic information science. It aims at exploring strategies, computational
methods, and tools to support... | | |
|
Applied SOA: Service-Oriented Architecture and Design StrategiesYou need more than theory to make SOA work.
You need this practical guide.
The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business... | | Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... | | Data Push Apps with HTML5 SSE: Pragmatic Solutions for Real-World Clients
Make sure your website or web application users get content updates right now with minimal latency. This concise guide shows you how to push new data from the server to clients with HTML5 Server-Sent Events (SSE), an exceptional technology that doesn’t require constant polling or user interaction. You’ll learn how... |
|
| | Windows Server 2003 Security CookbookIn the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know... | | |
|
Information Brokering Across Heterogeneous Digital Data: A Metadata-based ApproachInformation intermediation is the foundation stone of some of the most successful Internet companies, and is perhaps second only to the Internet Infrastructure companies. On the heels of information integration and interoperability, this book on information brokering discusses the next step in information interoperability and integration. The... | | Software Architecture Design Patterns in Java Partha Kuchana is an experienced enterprise systems architect. He understands that patterns are not about things that are just good ideas, but that patterns are about capturing knowledge bred from experience. This hard-won knowledge is what Partha is sharing with readers of his book. Here are some of the things I really like about what he has... | | |
|
|
Result Page: 85 84 83 82 81 80 79 78 77 76 75 |