|
|
|
|
|
Guide to Networking Essentials, Fourth Edition
This book is intended to serve the needs of individuals and information systems pro- fessionals who are interested in learning more about networking technologies, but who may have little or no background in this subject matter. In the first edition of this book, the materials were originally designed to help individuals prepare for Microsoft... | | | | Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised PapersThis book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.
The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed... |
|
Molecular Catalysts for Energy Conversion (Springer Series in Materials Science)The role of molecular catalysts for energy conversion grows more and more important since these have wide applications in fuel cells, electrochemical solar cells, artificial photo-syntheses, and so on. A firm strategy for their design and application is awaited to cope with the expeditious solution of the latest energy and environment issues. This... | | Information Security and Ethics: Social and Organizational IssuesInformation Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student... | | Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and
Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli,
Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed
introduction of these four papers, please refer to the Preface written by
the organizers... |
|
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations... | | Windows Vista in a Nutshell: A Desktop Quick ReferenceThis unique reference thoroughly documents every important setting and feature in Microsoft's new operating system, with alphabetical listings for hundreds of commands, windows, menus, listboxes, buttons, scrollbars and other elements of Windows Vista. With this book's simple organization, you'll easily find any setting,... | | Oracle Application Express 3.2: The Essentials and More
Developing data-centric web applications can be a real challenge as it is a multi-disciplinary process. There are many technologies involved in the client side (HTML, CSS, JavaScript, and so on); the interaction with the database, on the server side; the typeless nature of the web environment; and above all, the need to put it all together.... |
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |