 |
|
|
 Perspectives on Multimedia: Communication, Media and Information Technology"...There is most likely something for everyone in this book…" (Computer Bulletin, January 2005)
The uses of multimedia are rapidly increasing. Its power to present information in ways not previously possible and its integration of resources, allow for the creation of rich learning environments. Perspectives on... |  |  Autonomic Computing: Concepts, Infrastructure, and ApplicationsAdvances in networking and computing technologies, and software tools have resulted in an explosive growth in applications and information services that influence all aspects of our life. These sophisticated applications and services are complex, heterogeneous, and dynamic. Further, the underlying information infrastructure (e.g., the Internet)... |  |  Dreamweaver CS3 BibleLearn to create dynamic, data-driven Web sites—easily
If you're among the two and a half million Web professionals who already use Dreamweaver, here's your ticket to the exciting enhancements in the CS3 version. If you're just breaking into Web development, you'll get a thorough understanding of the basics. Either way,... |
|
 Windows Vista for Starters: The Missing ManualFast-paced and easy to use, this concise book teaches you the basics of Windows Vista so you can start using this operating system right away. Written by "New York Times" columnist, bestselling author, Emmy-winning CBS News correspondent and Missing Manuals creator David Pogue, the book will help you:
... |  |  Beginning Programming For DummiesNew techniques make programming easier and more fun
Discover principles and best practices that let you program in many languages
So you always thought programmers were superior beings from another galaxy? Surprise! Programming isn't all that difficult when you know how. Here's the fun and easy route to writing programs that work... |  |  Java Security SolutionsYour complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,... |
|
 Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... |  |  |  |  Human Interaction with Machines: Proceedings of the 6th International WorkshopThe International Workshop on “Human Interaction with Machines” is the sixth in a successful series of workshops that were established by Shanghai Jiao Tong University and Technische Universität Berlin. The goal of those workshops is to bring together researchers from both universities in order to present research results to an... |
|
| Result Page: 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 |