|
|
Electromagnetic Modeling of Composite Metallic and Dielectric StructuresThis practical new resource provides you with a much wider choice of analytical solutions to the everyday problems you encounter in electromagnetic modeling. The book enables you to use cutting-edge method-of-moments procedures, with new theories and techniques that help you optimize computer performance in numerical analysis of composite metallic... | | GFI Network Security and PCI Compliance Power ToolsUse GFI's Tools to Search for Vulnerabilities in Your Network!
For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.... | | The Myths of Security: What the Computer Security Industry Doesn't Want You to KnowIf you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is... |
|
|
Joomla! 1.5 SEOSome sites always appear at the top of a search result while others fail to even make it to the top ten. Wouldn't you want to see your site on the first page of any search result? This is not easily feasible if you are depending solely on the marketing guys whom you hire for SEO.
Joomla! SEO will help you to attract more visitors and... | | ModSecurity 2.5With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you... | | |
|
|
Result Page: 9 8 7 6 5 4 3 2 1 |