Home | Amazing | Today | Tags | Publishers | Years | Search 
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)

Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...

LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Systems Reliability and Failure Prevention (Artech House Technology Management Library)
Systems Reliability and Failure Prevention (Artech House Technology Management Library)
The primary aim of system reliability is the prevention of failures that affect the operational capability of a system. The probability of such failures can be reduced by the following:

• Conservative design—such as ample margins, use of parts and materials with established operating experience, and observing environmental
...
Multi-Agent-Based Simulation III: 4th International Workshop, MABS 2003, Melbourne, Australia, July 14th, 2003, Revised Papers
Multi-Agent-Based Simulation III: 4th International Workshop, MABS 2003, Melbourne, Australia, July 14th, 2003, Revised Papers
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Multi-Agent-Based Simulation, MABS 2003, held in Melbourne, Australia as part of AAMAS 2003.

The 11 revised full papers presented together with 3 invited papers were carefully selected during two rounds of reviewing and improvement. The papers...

Embedded Multitasking (Embedded Technology)
Embedded Multitasking (Embedded Technology)
In an embedded system, firmware is the software that directly interfaces with the microcontroller, controlling the systems function. The major forces driving the embedded firmware development process today are reduced development times, increased complexity, and the need to handle multiple tasks simultaneously. These forces translate into strenuous...
Task Scheduling for Parallel Systems (Wiley Series on Parallel and Distributed Computing)
Task Scheduling for Parallel Systems (Wiley Series on Parallel and Distributed Computing)

A new model for task scheduling that dramatically improves the efficiency of parallel systems

Task scheduling for parallel systems can become a quagmire of heuristics, models, and methods that have been developed over the past decades. The author of this innovative text cuts through the confusion and complexity by...

High-Performance Client/Server
High-Performance Client/Server
"Chris is one of the industry's most important thinkers on database design . . . I would strongly recommend this book to readers trying to get past the buzzwords and focus on what really makes a difference in achieving high-performance distributed systems." —David Stodder Editor-in-Chief, Database Programming & Design...
Reliability, Maintainability and Risk
Reliability, Maintainability and Risk
This 6th edition incorporates brand new material on the accuracy of reliability prediction and common cause failure based on the author's PhD research work. David J. Smith approaches these subjects from an entirely original and unique viewpoint, emphasising that the need to demonstrate that safety-related systems have been assessed against target...
Telecom Crash Course
Telecom Crash Course

"An outstanding book for the novice that should be on the desk of every industry professional as well. Written in a style that is never boring, it covers the vast technological landscape from standards and protocols to premise, access and transport technologies, managing to entertain every step of the way."
Kenneth R. Sato

...
Regulated Agent-Based Social Systems: First International Workshop, RASTA 2002, Bologna, Italy, July 16, 2002, Revised Selected and Invited Papers
Regulated Agent-Based Social Systems: First International Workshop, RASTA 2002, Bologna, Italy, July 16, 2002, Revised Selected and Invited Papers
This volume presents selected, extended and reviewed versions of the papers presented at the 1st International Workshop on Regulated Agent Systems: Theory and Applications (RASTA 2002), a workshop co-located with the 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002), which was held in Bologna, Italy, in...
Handbook of Virtual Humans
Handbook of Virtual Humans
Virtual Humans simulations are becoming increasingly popular and many systems are now available to animate Virtual Humans. Such systems encompass several different domains including autonomous agents in virtual environments, human factors analysis, training, education, virtual prototyping, simulation–based design and entertainment.

At...

Knowledge Exploration in Life Science Informatics: International Symposium KELSI 2004, Milan, Italy, November 25-26, 2004
Knowledge Exploration in Life Science Informatics: International Symposium KELSI 2004, Milan, Italy, November 25-26, 2004
This volume of the Springer Lecture Notes in Computer Science series contains the contributions presented at the International Symposium on Knowledge Exploration in Life Science Informatics (KELSI 2004) held in Milan, Italy, 25–26 November 2004.

The two main objectives of the symposium were:

To explore the symbiosis
...
Result Page: 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy