WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.
For more than a year, I had been grappling with an onslaught of urgent but...
You can test just about anything with Cucumber. We certainly have, and in Cucumber Recipes we'll show you how to apply our hard-won field experience to your own projects. Once you've mastered the basics, this book will show you how to get the most out of Cucumber--from specific situations to advanced test-writing...
The landmark book that changed the way exceptional families think about their heritage, their wealth, and their legacy to future generations--now revised and expanded.
Every family, looking at the next generation, hopes to confer advantages that are more than just material and financial--to inculcate character...
This practical text presents the most up-to-date information on the evaluation and management of all aspects of complex and revision shoulder arthroplasty, divided into three thematic section. Chapters in part I focus on the diagnosis and management of complex primary shoulder arthroplasty, including evaluation of humeral and glenoid bone...
Wireless Communications Systems and Networks covers the breadth of research in wireless communications. It begins by detailing the essential background, such as wireless standards, spread spectrum and CDMA systems, and goes on to discuss advanced topics in next generation wireless systems. Discussions of advanced-level materials progress in a...
Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
Denial of service (DoS) and other network layer attacks
Handbook of Data Structures and Applications responds to the needs of data structure and algorithm researchers by providing a comprehensive survey of data structures of various types. Divided into seven parts, the text begins with a review of introductory material, followed by a discussion of well-know classes of data structures, Priority...
Adobe Photoshop CS3 Extended: Retouching Motion Pictures is a hands-on, tutorial-based guide filled with real-world examples that run the gamut from video restoration to visual and special effects, green screen and split screen composite work, and integration of 3D content from applications such as Luxology modo, 3D Studio Max, and Cinema 4D. New...
I am very pleased to have this new book in the Aho/Ullman series Principles of Computer Science. I see this book as a major step toward making computer science theory accessible to the wide range of students who need to know the subject. It covers a good segment of the classical material on data structures and algorithms, but it does so in a...