|
|
|
|
Berkeley DBSmall, special-purpose computing devices and high-end core Internet servers need fast, reliable database management. Berkeley DB is an embedded database that provides high-performance, scalable, transaction-protected and recoverable data management services to applications. Extremely portable, this library runs under almost all... | | Exploring the JDS Linux DesktopThe ideal guide to JDS, Exploring the JDS Linux Desktop is clear and direct, and carefully covers such housekeeping chores as setting up networking, updates, and backups. It enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing,... | | Wiki: Web CollaborationImagine you are surfing the Internet, and you stop at a site where you could and would like to add or modify something. For instance, you have a literary reference or link to add. Or you've noticed a typing error. Perhaps you even have a lengthy article that you'd like to display on a separate page. So, you just click on the... |
|
| | AutoCAD 2002 BibleIf AutoCAD 2002 can do it, you can do it too … Packed with practical, real-world examples and authoritative advice, the AutoCAD 2002 Bible is your complete guide to the best AutoCAD yet. Expert author Ellen Finkelstein shows you how to master every aspect of this powerful design software, from 2D drawing and plotting fundamentals to database... | | Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con ArtistsIf you are reading this book or thinking about acquiring it, you have taken an important step toward increasing your awareness of the ways in which the Internet may be abused. J. A. Hitchcock has prepared a second edition of her popular book, Net Crimes and Misdemeanors, reflecting new ways in which you may encounter the dark side of global... |
|
Handbook of Database Security: Applications and TrendsDatabase security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of... | | Complex Dynamics in Communication Networks (Understanding Complex Systems)Computer and communication networks are among society's most important infrastructures. The internet, in particular, is a giant global network of networks with central control or administration. It is a paradigm of a complex system, where complexity may arise from different sources: topological structure, network evolution, connection and node... | | Hactivism and Cyberwars: Rebels with a CauseThis detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics describes the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. The authors provide an explanation of the different strands of hacktivism... |
|
|
|
Result Page: 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 292 |