Honeypots and Routers: Collecting Internet Attacks
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...
Master the use of Drupal and associated scripts to administrate, monitor, and optimize Solr
Learn how to work with monitoring tools like OpsView, New Relic, and SPM
Utilize Solr scripts and Collection Distribution scripts to manage Solr
Employ search features like...
Introduction to Wireless Localization: With iPhone SDK Examples
This book provides a comprehensive overview of the entire landscape of both outdoor and indoor wireless positioning, and guides the reader step by step in the implementation of wireless positioning applications on the iPhone. Explanations of fundamental positioning techniques are given throughout the text, along with many programming...
|Result Page: 24 23 22 21 20 19 18 17 16 15 |