 |
|
 Cocoon 2 Programming: Web Publishing with XML and JavaThanks to the tireless efforts of open-source developers, Cocoon has quickly gained visibility as the preeminent XML-based Web publishing framework. Unfortunately, its documentation remains a significant shortcoming. If you’re new to Cocoon, gaining a sense of exactly what you can do with it can be difficult, and actually... |  |  |  |  |
|
|
 Role-Based Access Control, Second EditionRole-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners... |  |  Network Security Evaluation: Using the NSA IEMAre you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop... |  |  |
|
 |  |  |  |  Inside PC Card: Cardbus and Pcmcia Design (Edn Series for Design Engineers)PC Card (or PCMCIA) technology allows computers to interface with each other using less space than conventional interfaces. Currently, most applications are in the personal computing market, to enhance peripheral capabilities. As the industry changes, the applications will grow outside of the PC arena, into areas such as medical instrumentation and... |
|
| Result Page: 305 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 |