Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...
This book examines fuzzy relational calculus theory with applications in various engineering subjects. The scope of the text covers unified and exact methods with algorithms for direct and inverse problem resolution in fuzzy relational calculus. Extensive engineering applications of fuzzy relation compositions and fuzzy linear systems...
Discover how to use ADO.NET and ASP.NET essentials to take your Web programming skills to the next level.
Most Web applications follow a simple “3F” pattern: fetch, format, and forward to the browser. With this in-depth guide, you’ll take your ASP.NET and ADO.NET skills to the next level and learn key...
Automatic object recognition has become an established discipline in image analysis. Moments and moment invariants play a very important role as features in invariant recognition. They were introduced to the pattern recognition community almost 50 years ago and the mathematical background they utilized is even older, originating from the...
Creative professionals seeking the fastest, easiest, most comprehensive way to learn Adobe Illustrator CS6 choose Adobe Illustrator CS6 Classroom in a Book from the Adobe Creative Team at Adobe Press. The 15 project-based lessons in this book show readers step-by-step the key techniques for working in Illustrator CS6 and how to create vector...
Social Networking has quickly become a very popular activity on the Internet, particularly with the emergence of sites like Facebook and MySpace. PHP is a flexible web development language used on a wide variety of sites, including Facebook and Yahoo! But building a social networking site from scratch using PHP involves some complex logic,...
Written by leaders in the field of remote sensing information processing, this work covers the frontiers of remote sensors, especially with effective algorithms for signal/image processing and pattern recognition with remote sensing data. Sensor and data fusion issues, SAR images, hyperspectral images, and related special topics are also...
Beginning Scala, Second Edition takes a down-to-earth approach to teaching Scala that leads you through simple examples that can be combined to build complex, scalable systems and applications.
This book introduces you to the Scala programming language, its object-oriented and functional programming characteristics, and...
Java just keeps growing, adding features, functionality, complexity, and tempting developers to growl with frustration. The new 1.4 release of Java 2 Standard edition increases the size of the platform by 50%, to 2757 classes in 135 packages. How are you going to figure out what this means for your applications? As always, Java in...
The Definitive Guide to Ajax Web Application Development
Evolve from the click-and-wait programming pattern to the latest Web 2.0 paradigm using this comprehensive guide to Ajax. Written by Web development expert Thomas Powell, the book lays out every feature of Ajax alongside detailed explanations and real-world...
"There are many books on the market on the topic of SOA and SOA's business and technology value. This book focuses on one of the key technical values of SOA and does an excellent job of describing SOA-based application integration by clarifying the relationship and patterns of SOA with other...