|
|
|
|
|
|
Perl Scripting for IT SecurityThis book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely... | | Depth Map and 3D Imaging Applications: Algorithms and Technologies
This book has three editors, and all of us are involved in image processing and computer vision research.
We have contributed to the 3D imaging research, especially in the field of passive optical 3D shape
recovery methods. Over the last decade, significant progress had been made in 3D imaging research. As
a result, 3D imaging... | | Planning for Survivable NetworksKeep your network safe from security disasters with a dependable recovery strategy
Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.
In the information-packed pages of this book, Annlee Hines shares her... |
|
|
|
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |