 |
|
 Role-Based Access Control
Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,... |  |  Allies and Enemies: How the World Depends on Bacteria
Bacteria: How they keep you alive. How they can kill you. How we can all live together happily.
Bacteria are invisible, mysterious, deadly, self-sufficient…and absolutely essential for all life, including yours. No other living... |  |  |
|
 Audience, Relevance, and Search: Targeting Web Audiences with Relevant Content
How much more effective would companies be if all the content they created for the Web reached its specific target audience? In this book, three pioneering IBM content and search experts show how to get closer to this goal than ever before. Readers will discover how to write highly relevant content containing the keywords and long-tail... |  |  Plone 3 Intranets
Plone is widely used for creating feature-rich and secure enterprise intranets. Each company has different goals, architecture, hierarchy, and size and requires a very different intranet to manage its business. No matter what size, or what purpose, Plone offers solutions to the most common intranet needs, and more.
If you've... |  |  XNA 3.1 Game Development for Teens
XNA 3.0 GAME DEVELOPMENT FOR TEENS is a complete guide to entry level programming and computer game development using XNA 3.0 and the Visual C# 2008 Express programming language for beginners. This book shows readers how to create and execute computer games on their PC, and then how to port their PC games over to their Xbox 360 or Zune... |
|
 Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center
Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud... |  |  The Structure of Style: Algorithmic Approaches to Understanding Manner and Meaning
Style is a fundamental and ubiquitous aspect of the human experience: Everyone instantly and constantly assesses people and things according to their individual styles, academics establish careers by researching musical, artistic, or architectural styles, and entire industries maintain themselves by continuously creating and marketing new... |  |  Active Directory Domain Services 2008 How-To
Need fast, reliable, easy-to-implement solutions for Microsoft Active Directory 2008? This book delivers exactly what you’re looking for. You’ll find nearly 250 tested, step-by-step procedures for planning, installing, customizing, and managing Active Directory Domain Services (AD DS) in any production... |
|
|
Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 |