|
|
|
|
|
|
Writing Security Tools and ExploitsExploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,... | | | | Business Applications and Computational IntelligenceComputational intelligence has a long history of applications to business - expert systems have been used for decision support in management, neural networks and fuzzy logic have been used in process control, a variety of techniques have been used in forecasting, and data mining has become a core component of customer relationship management in... |
|
| | | | AutoCAD 2011 Tutor for Engineering Graphics
Engineering graphics is the process of defining an object graphically before it is constructed
and used by consumers. Previously, this process for producing a drawing involved
the use of drawing aids such as pencils, ink pens, triangles, T-squares, and so
forth to place an idea on paper before making changes and producing blue-line... |
|
|
Result Page: 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 |