 |
|
 Embedded Java Security: Security for Mobile DevicesThis book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically... |  |  Wireless Mesh Networking: Architectures, Protocols and StandardsThis is the first book to provide readers a comprehensive technical guide covering recent and open issues in wireless mesh networks. Wireless Mesh Networking: Architectures, Protocols and Standards explores the various key challenges in diverse scenarios as well as emerging standards, including capacity and scalability. It focuses on concepts,... |  |  Smart Client Architecture and Design Guide (Patterns & Practices)Get expert, pragmatic guidance on how to design and build smart client solutions that combine the benefits of traditional, rich-client applications with the manageability of thin clients. Software architects and developers will learn how to evaluate whether a smart client solution is appropriate for their client architecture, and get practical... |
|
|
 Application of Agents and Intelligent Information TechnologiesThe Web has sparked renewed interest in developing intelligent information systems that enable users to accomplish complex tasks in Web-centric environments with relative ease. Although artificially intelligent (AI) technologies such as expert systems and neural networks have been successfully used in aerospace, communication, medical, and... |  |  Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... |  |  Microsoft Exchange Server 2007 UnleashedThis is the ultimate guide to the design, migration, implementation, administration, management, and support of an Exchange Server 2007 environment. The recommendations, tips, and tricks covered are based on more than two years of early adopter implementations of Exchange 2007. The authors highlight the features and functions that organizations... |
|
 |  |  Networks and TelecommunicationsThe second edition of this text is a much larger work than the first edition, having needed to be expanded with extensive new sections on data, broadband and multimedia networks and much extended coverage of modern transmission media, radio and network management. The technology may have moved on since 1990, but the original preface is as relevant... |  |  |
|
| Result Page: 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 |