|
|
|
|
|
Good Style: Writing For Science and TechnologyExplains the tactics that should be used to write technical material - ranging from reports to manuals - in a coherent, readable style. It discusses in detail choice of vocabulary, phrasing and sentence structure; each piece of advice is supported
In seminars and workshops over the past 40 years, I have had the good fortune to be able to... | | Role-Based Access Control, Second EditionRole-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners... | | How to Cheat at Configuring Open Source Security ToolsThe Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and... |
|
|
| | Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWLThe promise of the Semantic Web to provide a universal medium to exchange data information and knowledge has been well publicized. There are many sources too for basic information on the extensions to the WWW that permit content to be expressed in natural language yet used by software agents to easily find, share and integrate information. Until... | | |
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |