 |
|
 Internet Visual Quick TipsWould you like to browse the Web incognito, boost your system's performance, get more out of Google, and enjoy all the cool ways to social network? Then this Visual Quick Tips book is for you. This book will increase your productivity by providing you with shortcuts, tricks, and tips to help you work smarter and faster.
... |  |  Terrorism Informatics: Knowledge Management and Data Mining for Homeland SecurityTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are... |  |  Complete Java 2 Certification Study Guide, 4th EditionHere’s the book you need to prepare for the Java 2 Programmer's and Developer's exams. This Study Guide provides:
- In-depth coverage of every exam objective for the Programmer's Exam for J2SE 1.4
- Hundreds of challenging practice questions
... |
|
 |  |  Steiner Tree Problems In Computer Communication NetworksThe Steiner tree problem is one of the most important combinatorial optimization problems. It has a long history that can be traced back to the famous mathematician Fermat (1601 1665). This book studies three significant breakthroughs on the Steiner tree problem that were achieved in the 1990s, and some important applications of Steiner tree... |  |  |
|
 Trust and Security in Collaborative Computing (Computer and Network Security)Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group... |  |  Role-Based Access Control, Second EditionRole-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners... |  |  |
|
 The Zope Book (Landmark)The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope... |  |  Deploying LINUX on the DesktopCovering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!
Looking at the world of the... |  |  Cooperative Control of Distributed Multi-Agent SystemsThe paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in... |
|
Result Page: 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 |