 |
|
 A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.
As the... |  |  Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Pattern recognition is a central topic in contemporary computer sciences, with continuously evolving topics, challenges, and methods, including machine learning, content-based image retrieval, and model- and knowledge-based approaches, just to name a few. The Iberoamerican Congress on Pattern Recognition (CIARP) has become established as a... |  |  Performance Testing Guidance for Web Applications
Performance Testing Guidance for Web Applications provides an end-to-end approach for implementing performance testing. Whether you are new to performance testing or looking for ways to improve your current performance-testing approach, you will gain insights that you can tailor to your specific scenarios.
The information in this... |
|
|
 |  |  Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the
dynamics of the computer software industry for the next long while, just as it has for the
last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers
to software in which the source code is freely available to... |  |  |
|
|
Result Page: 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 |