|
|
|
|
|
A UML Pattern Language (Macmillan Technology Series)This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called... | | Mac OS X 10.4 Tiger : Visual QuickStart GuideSo you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will... | | Buffer Overflow AttacksBuffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have... |
|
|
| | Enterprise Information Systems: 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, RevisedThis book contains the carefully selected best papers of the 8th International Conference on Enterprise Information Sysetms, ICEIS 2006, held in Paphos, Cyprus, in May 2006.
The 4 invited papers and 27 revised and selected papers presented in this volume cover different aspects related to enterprise computing. They were selected from 63... | | |
|
|
Result Page: 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 |