 |
|
|
 |  |  |  |  Securing Ajax Applications: Ensuring the Safety of the Dynamic WebAjax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the... |
|
 Artificial Intelligence (Handbook Of Perception And Cognition)The problem of perception and cognition is understanding how the organism transforms, organizes, stores, and uses information arising from the world in sense data or memory. With this definition of perception and cognition in mind, this handbook is designed to bring together the essential aspects of this very large, diverse, and scattered... |  |  Business Continuity and Disaster Recovery for InfoSec ManagersEvery year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of... |  |  IP over WDM: Building the Next Generation Optical InternetThe primary objective of this book is to provide, in an understandable style, comprehensive and practical information on the transport of the Internet protocol (IP) over the optical/wavelength-division-multiplexed (WDM) layer. This is accomplished by providing sufficient background information on the enabling technologies, followed by an in-depth... |
|
|
| Result Page: 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 |