Trying to find the perfect networking resource or textbook can be a real challenge.
Sometimes they are extremely focused on one technology, and thus miss the mark. Or
they are extremely broad, covering every networking idea known to man. This book is
about something that all networks have in common—the core protocols. Networks...
On behalf of the Program Committee, it is our pleasure to present to you the
proceedings of the 8th Conference on Detection of Intrusions and Malware &
Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international
experts from academia, industry and government to present and discuss
novel security research....
I got started in Blender approximately eight and a half years ago. At the time,
there were very few tutorials or other training resources available. Essentially, the
only resource around was the people of the Blender Community, who was active
through the online forum, http://blenderartists.org. With nothing but the generous
time of...
What’s this book all about? Well, it’s about how to develop software, from a personal perspective. We’ll
look at what it means for you to take a problem and produce a program to solve it from beginning to
end. That said, this book focuses a lot on design. How do you design software? What things do you take
into...
This book is about directing diverse forces toward a unifi ed goal: the completion of a web project.
While the goal in this case is very specifi c — a Drupal website — in many ways, it outlines successful
steps for completing any life project, including Drupal itself.
I started the Drupal project in my dorm room in...
You may have heard about social networking sites on the Web. If you view a list of social
networking Web sites (http://en.wikipedia.org/wiki/List_of_social_networking_
websites) on Wikipedia, a popular reference site, you will see links to more than 100
networking sites, available from around the world and catering to every taste. The...
The important role that discrete structures plays in computer science is gaining recognition.
Computing Curricula 2001 (CC2001), the latest curriculum recommendation for computer-
related education, was a joint undertaking of the Institute for Electrical and Electronic
Engineers/Computer Society (IEEE/CS) and the Association for...
In my recent e-book #OccupyIT: A Technology Manifesto for the Cloud, Mobile,
and Social Era (http://www.aiim.org/occupyIT), I talk about the revolutionary
changes that are impacting how we make enterprise technology decisions.
On the one hand, we have "the business," awed and impressed by the changes and...
Before Oracle Application Express (APEX) can be discussed in the light of Agile software development, the stage must be set by defining, for the purposes of this book, what is meant by Agile software development.
This chapter introduces you to the core principles of Agile software development. The core principles were...
Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...
Windows 8 is the most important change to the Windows operating system since
Windows
95. While almost everything you’ve come to love about earlier versions
of Windows is still available, Windows 8 provides an infrastructure on which the
next generation of PCs and apps will be built. These new PCs and...
In the summer of 2008, I began a personal blog powered by WordPress and quickly fell for the ease and extensibility of the platform. As an educator, I had tried a number of tools to power course websites, but had to be satisfied with the results. With the fall semester approaching, I decided to try WordPress in the classroom. As the academic...