 |
|
|
 Malware Detection (Advances in Information Security)Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many... |  |  Sensors Applications, Volume 2Taken as a whole, this series covers all major fields of application for commercial sensors, as well as their manufacturing techniques and major types. As such the series does not treat bulk sensors, but rather places strong emphasis on microsensors, microsystems and integrated electronic sensor packages. Each of the individual volumes is tailored... |  |  Outlook 2007 For Dummies (Computer/Tech)Make scheduling and e-mail more efficient with Outlook
Control your contacts, connect to podcasts and blogs, and team up with others
Outlook is a powerhouse for managing that mountain of e-mail, but do you know all the other things it can do? This book walks you through the cool... |
|
|
 Zope BibleThis comprehensive Bible for Web Developers, Web Architects, and Content Managers covers everything you need to build Web sites with Zope, the leading Open Source Web application platform.
Covers all you need to build Web sites with Zope, the leading Open Source Web application platform. Softcover. CD-ROM included. ... |  |  Understanding IPTV (Informa Telecoms & Media)Just when we thought we had mastered modern communications-related acronyms, a new one has appeared. That acronym, IPTV, which is the subject of this book, represents an emerging technology that could change the manner by which we receive home entertainment, obtain training, operate our personal computers, and even use our cell phones. The acronym... |  |  Decrypted Secrets: Methods and Maxims of Cryptology"The best single book on cryptology today." --Cryptologia (from a review of a previous edition)
"It is an outstanding book that assumes only elementary mathematical knowledge and is interspersed with many exciting, amusing, and sometimes personal stories from the history of cryptology." ... |
|
Result Page: 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 |