|
|
|
|
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Overview
-
Learn how mobile devices are monitored and the impact of cloud computing
... | | Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing... | | |
|
Dreamweaver 8 : The Missing ManualAvailable for both the Mac and Windows, Macromedia's Dreamweaver 8 is a professional web design and development program used by millions of Internet professionals to build high-quality static and dynamic database-driven web sites. It offers drag-and-drop simplicity, streamlined HTML coding tools, and powerful database integration... | | Core Python Programming (Prentice Hall Ptr Core Series)Python is an Internet and systems programming language that is soaring in popularity in today's fast-paced software development environment, and no wonder: it's simple (yet robust), object-oriented (yet can be used as a procedural language), extensible, scalable and features an easy to learn syntax that is clear and concise. Python combines the... | | Peer-to-Peer : Harnessing the Power of Disruptive Technologies
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and... |
|
Real World Linux Security (2nd Edition)
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or... | | MySpace Unraveled: What it is and how to use it safelyDo you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech... | | Programming INDIGOMicrosoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.
I wrote my first communication program over 20 years ago and... |
|
JSP: Practical Guide for ProgrammersIt has been more than 10 years since the introduction of the Mosaic Web browser from NCSA when the Web first achieved widespread notice. Early Web pages were generally simple, as people slowly learned the new Hypertext Markup Language (HTML) concepts. As the Internet-browser wars heated up, more people entered the fray, and different technologies,... | | Machine Translation: Its Scope and LimitsMachine Translation (MT) is both an engineering technology and a measure of all things to do with languages and computers—whenever a new theory of language or linguistics is offered, an important criteria for its success is whether or not it will improve machine translation.
This book presents a history of machine translation (MT) from... | | Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable AssetsInside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive... |
|
|
Result Page: 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 |