|
|
|
|
Security for Web Services and Service-Oriented ArchitecturesWeb services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with... | | Implementation Patterns (Addison-Wesley Signature)Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming
Great code doesn’t just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify... | | Honeypots and Routers: Collecting Internet Attacks
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to... |
|
| | Machine Vision : Theory, Algorithms, PracticalitiesIn the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists... | | |
|
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |