|
|
|
|
| | Writing Security Tools and ExploitsExploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,... | | |
|
Embedded Linux: Hardware, Software, and InterfacingEmbedded Linux covers the development and implementation of interfacing applications on an embedded Linux platform. It includes a comprehensive discussion of platform selection, crosscompilation, kernel compilation, root filesystem creation, booting, remote debugging, real-world interfacing, application control, data... | | Microsoft Exchange Server Survival Guide (Version 4.0.)Microsoft Exchange Server is quickly becoming a popular product in Microsoft's BackOffice suite. As the weeks go by since its April, 1996 introduction, the momentum behind Exchange Server continues to build. In its first version, Exchange Server 4.0 is a powerful, feature-rich product that is finding its rightful place in the hands of the... | | Similarity Search: The Metric Space Approach (Advances in Database Systems)The area of similarity searching is a very hot topic for both research and commercial applications. Current data processing applications use data with considerably less structure and much less precise queries than traditional database systems. Examples are multimedia data like images or videos that offer queryby-example search, product catalogs... |
|
|
|
|
Result Page: 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 |