|
|
|
|
|
Understanding .NET: A Tutorial and AnalysisMicrosoft's .NET is a collection of new technologies that are revolutionizing Windows-based software development. A major theme of .NET is the idea of Web services, allowing software to communicate directly with other software using Internet technologies. The .NET Framework and Visual Studio.NET, two more core aspects of this initiative, provide... | | Practical Hacking Techniques and CountermeasuresExamining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.
It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to... | | Geometric Methods for Quantum Field TheoryBoth mathematics and mathematical physics have many active areas of research where the interplay between geometry and quantum field theory has proved extremely fruitful. Duality, gauge field theory, geometric quantization, Seiberg-Witten theory, spectral properties and families of Dirac operators, and the geometry of loop groups offer some striking... |
|
|
Windows Server 2012 Unified Remote Access Planning and Deployment
DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,... | | Handbook of Systems and Complexity in Health
This book is an introduction to health care as a complex adaptive system, a system that feeds back on itself. The first section introduces systems and complexity theory from a science, historical, epistemological, and technical perspective, describing the principles and mathematics. Subsequent sections build on the health applications of... | | Stealing the Network: How to Own the BoxStealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real.While none of these specific events have happened, there is no reason why they could not.You could argue it provides a roadmap for criminal hackers, but I say it does something... |
|
|
Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 |