|
|
|
|
|
Hacking VoIP: Protocols, Attacks, and CountermeasuresVoice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,... | | Lie Algebras: Theory and Algorithms, Volume 56 (North-Holland Mathematical Library)
The aim of the present work is two-fold. Firstly it aims at a giving an account of many existing algorithms for calculating with finite-dimensional Lie algebras. Secondly, the book provides an introduction into the theory of finite-dimensional Lie algebras. These two subject areas are intimately related. First of all, the algorithmic perspective... | | Beginning Silverlight 3Silverlight design tools have important differences compared to those used to create Ajax and JavaScript functionality. Robert Lair takes you on a tour of all the tools, including Microsoft Expression Design, which plays an important part in creating Silverlight assets; Microsoft Expression Blend, which is used to build user... |
|
|
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |