Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011

The fourth edition of the International Conference on Geospatial Semantics (GeoS 2011) was held in Brest, France, during May 12–13, 2011.

Geospatial semantics (GEOS) is an emerging research area in the domain of geographic information science. It aims at exploring strategies, computational methods, and tools to support...

Innovations in Machine Learning: Theory and Applications (Studies in Fuzziness and Soft Computing)
Innovations in Machine Learning: Theory and Applications (Studies in Fuzziness and Soft Computing)
The study of innovation – the development of new knowledge and artifacts – is of interest to scientists and practitioners. Innovations change the day-to-day lives of individuals, transform economies, and even create new societies. The conditions triggering innovation and the innovation process itself set the stage for economic...
Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Data Push Apps with HTML5 SSE: Pragmatic Solutions for Real-World Clients
Data Push Apps with HTML5 SSE: Pragmatic Solutions for Real-World Clients

Make sure your website or web application users get content updates right now with minimal latency. This concise guide shows you how to push new data from the server to clients with HTML5 Server-Sent Events (SSE), an exceptional technology that doesn’t require constant polling or user interaction. You’ll learn how...

Recent Econometric Techniques for Macroeconomic and Financial Data (Dynamic Modeling and Econometrics in Economics and Finance, 27)
Recent Econometric Techniques for Macroeconomic and Financial Data (Dynamic Modeling and Econometrics in Economics and Finance, 27)

The book provides a comprehensive overview of the latest econometric methods for studying the dynamics of macroeconomic and financial time series. It examines alternative methodological approaches and concepts, including quantile spectra and co-spectra, and explores topics such as non-linear and non-stationary behavior, stochastic...

Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Legal Knowledge and Information Systems:  JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
Legal Knowledge and Information Systems: JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
This volume contains the Proceedings of the Nineteenth JURIX Conference on Legal Knowledge and Information Systems (JURIX 2006), December 7th–9th, Université Pantheon Assas – Paris II, France. This year we hoped to put two new topics on the agenda: Artificial Intelligence in police and intelligence services and the impact of AI...
Information Brokering Across Heterogeneous Digital Data: A Metadata-based Approach
Information Brokering Across Heterogeneous Digital Data: A Metadata-based Approach
Information intermediation is the foundation stone of some of the most successful Internet companies, and is perhaps second only to the Internet Infrastructure companies. On the heels of information integration and interoperability, this book on information brokering discusses the next step in information interoperability and integration. The...
Software Architecture Design Patterns in Java
Software Architecture Design Patterns in Java
 Partha Kuchana is an experienced enterprise systems architect. He understands that patterns are not about things that are just good ideas, but that patterns are about capturing knowledge bred from experience. This hard-won knowledge is what Partha is sharing with readers of his book. Here are some of the things I really like about what he has...
Essential Windows Workflow Foundation (Microsoft .NET Development Series)
Essential Windows Workflow Foundation (Microsoft .NET Development Series)

Windows Workflow Foundation (WF) is a groundbreaking approach to writing and executing programs. WF programs are assembled out of resumable program statements called activities, which provide encapsulation of both domainspecific logic and control flow patterns reflective of real-world...

unlimited object storage image
Result Page: 85 84 83 82 81 80 79 78 77 76 75 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy