 |
|
 Creating Web-based Laboratories (Advanced Information and Knowledge Processing)Remote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video camera & microphone before the equipment and apparatus to capture what is actually happening in the... |  |  |  |  High Performance Computing on Vector Systems 2007The book presents the state-of-the-art in high performance computing and simulation on modern supercomputer architectures. It covers trends in hardware and software development in general and specifically the future of vector-based systems and heterogeneous architectures. The application contributions cover computational fluid dynamics,... |
|
 The Best Damn Firewall Book Period, Second EditionThe Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.
Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this... |  |  |  |  |
|
 Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.
The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical... |  |  |  |  Embedded Security in Cars: Securing Current and Future Automotive IT ApplicationsMost innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive... |
|
|
Result Page: 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 |