 |
|
 BackTrack 4: Assuring Security by Penetration Testing
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your... |  |  Data Management and Query Processing in Semantic Web Databases
The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which... |  |  Alice 3 Cookbook
Alice is a free and innovative 3D programming environment that makes it easy to create an animation for telling a story, playing an interactive game, or a video to share on the Web. Alice is a teaching tool designed as a revolutionary approach to teaching and learning introductory programming concepts.
Alice 3 Cookbook focuses on... |
|
 Experience and Knowledge Management in Software Engineering
Nowadays, there is software everywhere in our life. It controls cars, airplanes, factories, medical implants. Without software, banking, logistics and transportation, media, and even scientific research would not function in the accustomed way. Building and maintaining software is a knowledge-intensive endeavour and requires that specific... |  |  The Compiler Design Handbook: Optimizations & Machine Code Generation
In the last few years, changes have had a profound influence on the problems addressed by compiler designers. First, the proliferation in machine architectures has necessitated the fine-tuning of compiler back ends to exploit features such as multiple memory banks, pipelines and clustered architectures. These features provide potential for... |  |  Cryptanalysis of RSA and Its Variants
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its... |
|
 Color Imaging: Fundamentals and Applications
Color is one of the most fascinating areas to study. Color forms an integral part
of nature, and we humans are exposed to it every day. We all have an intuitive
understanding of what color is, but by studying the underlying physics, chemistry,
optics, and human visual perception, the true beauty and complexity of color can
be... |  |  An Introduction to Parallel Programming
Parallel hardware has been ubiquitous for some time now. It’s difficult to find a laptop,
desktop, or server that doesn’t use a multicore processor. Beowulf clusters are
nearly as common today as high-powered workstations were during the 1990s, and
cloud computing could make distributed-memory systems as accessible as... |  |  Access Solutions: Tips, Tricks, and Secrets from Microsoft Access MVPs
Doug and I have known each other online for many years. We both became Microsoft
MVPs about 10 years ago, and have been friends ever since. Both of us had been writing
for magazines for years. Although we’d been talking about writing a book together
for about five years now, there had always been an impediment, usually work, and... |
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |