Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm
shift—intelligence is at the edge, computing is completely decentralized, and
the network is just there to knit the distributed intelligence together. Indeed,
with advancements in hardware technology, proliferation of the open source
development... Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...
Practical Ruby for System Administration (Expert's Voice in Open Source) Ruby has set the world on fire, proving itself a serious challenger to Perl and Python in all spheres. In particular, more and more people are discovering that Ruby's flexibility, superb feature set, and gentle learning curve make it a natural choice for system administration tasks, from the humblest server to the largest enterprise deployment....
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive... Fast Track Visual C++(r) 6.0 Programming Get up to speed with the latest version of Visual C++. What makes Fast Track the C++ guide of choice is leading expert Steve Holzner's practical approach to learning by example. Cutting right to the core of issues crucial to programmers, this book begins with a brief refresher course and then moves quickly onto the skills that really count:...
Data Mining and Machine Learning in Cybersecurity
In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a
critical organizational and national research agenda inviting interest from a multidisciplinary
scientific workforce. There are many avenues into this area, and, in recent
research, machine-learning and data-mining techniques have been applied to design,...
Object-Oriented Programming with Visual Basic .NET
This book is not a reference. That needs to be said right off the bat. It was written to be read cover to cover; it tells a story. It's an interwoven tale about object-oriented programming in the .NET world: building objects, moving them, and using them around the world. This is not just a how-to book; it's a why-to and a when-to...
Formula One Racing for Dummies Formula One racing is the pinnacle of motor racing around the world. These days, the sport is a truly global circus. At almost every race on the calendar, more than 120,000 spectators cram into the grandstands and spectator banking, all vying for a view of the millionaire superstar drivers. At the same time, in 150 countries worldwide, more than...
|Result Page: 7 6 5 4 3 2 1 |