|
|
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.
The Program Committee,... | | Murach's HTML, XHTML, and CSS (Web Programming)
If you have anything to do with web development, you should know how to use HTML. XHTML, and CSS the modern, professional way. That's true if you want to become a web designer. That's true for web designers who still use tables for page layout when they should be using CSS. That's true for JavaScript programmers. And that's... | | |
|
|
PayPal APIs: Up and Running: A Developer's Guide
Virtually every application delivery model is experiencing a surging demand for transaction convenience. In this book, I introduce PayPal APIs, along with instructions and resources for their integration in different environments, including websites and mobile applications.
The goal of this book is to help you understand... | | iPad 2: The Missing Manual
Steve Jobs revealed the original iPad on January 27, 2010, finally confirming rumors that had been swirling for years: Apple was making a tablet computer! And when that first iPad model hit stores a few months later, the public snapped up 300,000 the day it went on sale.
Less than a year later after the first one arrived, Apple put... | | Performance Testing Guidance for Web Applications
Performance Testing Guidance for Web Applications provides an end-to-end approach for implementing performance testing. Whether you are new to performance testing or looking for ways to improve your current performance-testing approach, you will gain insights that you can tailor to your specific scenarios.
The information in this... |
|
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.
As the... | | Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Pattern recognition is a central topic in contemporary computer sciences, with continuously evolving topics, challenges, and methods, including machine learning, content-based image retrieval, and model- and knowledge-based approaches, just to name a few. The Iberoamerican Congress on Pattern Recognition (CIARP) has become established as a... | | Cacti 0.8 Beginner's Guide
Generally speaking, network management refers to the tasks associated with running a network, along with the software, tools, and technology required to support these tasks. One major part of running a network is to monitor the devices on it in order to know
what is happening.
One definition of network management from the... |
|
Result Page: 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 |