 |
|
 Clustering (IEEE Press Series on Computational Intelligence)Clustering has become an increasingly important topic in recent years, caused by the glut of data from a wide variety of disciplines. However, due to the lack of good communication among these communities, similar theories or algorithms are redeveloped many times, causing unnecessary waste of time and resources. Furthermore, different terminologies... |  |  Guide to Computer Network Security (Computer Communications and Networks)Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to... |  |  |
|
 |  |  SAP Security Configuration and Deployment: The IT Administrator's Guide to Best PracticesThe user's guide to best practices in improving and enhancing security in a SAP landscape.
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and... |  |  |
|
 |  |  |  |  Pro Full-Text Search in SQL Server 2008Linguistic (language-based) searching has long been a staple of web search engines such as Google and high-end document management systems. Many developers have created custom utilities and third-party applications that implement complex search functionality similar to that provided by the most popular search engines. What many people don’t... |
|
 |  |  Web Security Testing Cookbook: Systematic Techniques to Find Problems FastAmong the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad... |  |  |
|
| Result Page: 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 |