|
|
|
|
|
|
Cyberthreats: The Emerging Fault Lines of the Nation State
As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an... | | Python and HDF5
Gain hands-on experience with HDF5 for storing scientific data in Python. This practical guide quickly gets you up to speed on the details, best practices, and pitfalls of using HDF5 to archive and share numerical datasets ranging in size from gigabytes to terabytes.
Through real-world examples and practical exercises,... | | Securing Im and P2P Applications for the EnterpriseAre You Ready for the Network Equivalent of Guerrilla Warfare?
Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of... |
|
|
|
Result Page: 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 |