Home | Amazing | Today | Tags | Publishers | Years | Search 
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Configuring and Troubleshooting Windows XP Professional
Configuring and Troubleshooting Windows XP Professional
The thing about Windows XP Professional is, users love it. It has a slick interface and it behaves far more intelligently and predictably than some of its predecessors. The new system of software registration aside, Windows XP surely is the most highly acclaimed Microsoft...
Grouping Multidimensional Data: Recent Advances in Clustering
Grouping Multidimensional Data: Recent Advances in Clustering
Clustering is a fundamental problem that has numerous applications in many disciplines. Clustering techniques are used to discover natural groups in datasets and to identify abstract structures that might reside there, without having any background knowledge of the characteristics of the data. They have been used in various areas including...
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

Inhabited Information Spaces: Living with your Data
Inhabited Information Spaces: Living with your Data
In this book you will find some examples of work in particular from the Inhabited Information Spaces Grouping. It is interesting to see how some of these ideas are still “futuristic” and others have started to become part of mainstream thinking and made their way into products.

Some people say that you can find
...
Configuring Exchange 2000 Server
Configuring Exchange 2000 Server
C.A. Murff MCSE, MCT, CTT, CNA
Who should read this book? Anyone looking for clear, relevant answers on how to best utilize their existing Exchange 2000 environment.

Configuring Exchange Server 2000 is an intermediate to advanced book for both administrators and developers who are actively using
...
How to Think Like a Computer Scientist: Learning with Python
How to Think Like a Computer Scientist: Learning with Python
Benjamin Crowell, in "The Assayer", book reviews and discussion for the free-information renaissance
...There's ... emphasis on teaching computer science not just as a technical trade but as a mental discipline.

Guido van Rossum, creator of
...
Build Your Own Database Driven Website Using PHP & MySQL
Build Your Own Database Driven Website Using PHP & MySQL
This book is aimed at intermediate and advanced Web designers looking to make the leap into server-side programming. You’ll be expected to be comfortable with simple HTML, as I’ll make use of it without much in the way of explanation. No knowledge of JavaScript is assumed or required, but if you do know JavaScript, you’ll find it...
Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

**Covers Nagios 2.0**

"WOW! This books is incredibly detailed and Wolfgang has done an excellent job. I don't think I could have gone into that much detail if I wrote a book mysel. Kudos!" —Ethan Galstad, Nagios main developer

Good system administrators know about problems long before anyone asks,...

Data Mining: Opportunities and Challenges
Data Mining: Opportunities and Challenges
An overview of the multidisciplinary field of data mining, this book focuses specifically on new methodologies and case studies. Included are case studies written by 44 leading scientists and talented young scholars from seven different countries. Topics covered include data mining based on rough sets, the impact of missing data, and mining free...
Optical Burst Switched Networks
Optical Burst Switched Networks

Next-generation high-speed Internet backbone networks will be required to support a broad range of emerging applications which may not only require significant bandwidth, but may also have strict quality of service (QoS) requirements. Furthermore, the traffic from such applications are expected to be highly bursty in nature. For such traffic,...

Fraud Exposed: What You Don't Know Could Cost Your Company Millions
Fraud Exposed: What You Don't Know Could Cost Your Company Millions
The $600 billion gorilla in the room

"Dr. Joe Koletar has provided an effective road map to the problem of occupational fraud, in both the public and private sectors, in America. Such frauds affect every American worker, shareholder, and taxpayer. His insights and ideas are an important contribution to the effort to fight this growing...

Result Page: 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy