|
|
Mobile Malware Attacks and DefenseThe Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new... | | Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)Drawing on a wealth of new evidence from all sides, Triumph Forsaken overturns most of the historical orthodoxy on the Vietnam War. Through the analysis of international perceptions and power, it shows that South Vietnam was a vital interest of the United States. The book provides many new insights into the overthrow of Ngo Dinh Diem in 1963 and... | | |
|
|
Emergence in Games (Charles River Media Game Development)The future direction of game development is towards more flexible, realistic, and interactive game worlds. However, current methods of game design do not allow for anything other than pre-scripted player exchanges and static objects and environments. An emergent approach to game development involves the creation of a globally designed game system... | | Anatomy of a Robot (TAB Robotics)This work looks under the hood of all robotic projects, stimulating teachers, students, and hobbyists to learn more about the gamut of areas associated with control systems and robotics. It offers a unique presentation in providing both theory and philosophy in a technical yet entertaining way.
UNDER THE HOOD OF A... | | Introduction to Network Security (Networking Series)In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators... |
|
Enterprise Web Services Security (Internet Series)Learn to Protect Your Assets and Prevent Attacks!
The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security... | | Foundation ASP.NET for FlashASP.NET 2.0 is the new version of Microsoft's groundbreaking server-side scripting language. There is currently a huge demand to integrate dynamic content into Flash websites and applications and, as a solid competitor to technologies such as JSP, PHP, and ColdFusion, ASP.NET is one of the most popular choices to achieve this.
Used in... | | Moral Machines: Teaching Robots Right from WrongSo in a single thought-provoking volume, the authors not only introduce machine ethics, but also an inquiry which penetrates to the deepest foundations of ethics. The conscientious reader will no doubt find many challenging ideas here that will require a reassessment of her own beliefs, making this text a must-read among recent books in philosophy,... |
|
Result Page: 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 |