Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security...

Mathematical Models of Beams and Cables
Mathematical Models of Beams and Cables

Nonlinear models of elastic and visco-elastic onedimensional continuous structures (beams and cables) are formulated by the authors of this title. Several models of increasing complexity are presented: straight/curved, planar/non-planar, extensible/inextensible, shearable/unshearable, warpingunsensitive/ sensitive, prestressed/unprestressed...

Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Build, secure, scale, and maintain Citrix on Windows

New and existing Citrix engineers will learn to design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix Access Suite 4.0. This official guide explains how to maximize the suite components to enable and...

Professional SQL Server 2000 Database Design
Professional SQL Server 2000 Database Design
SQL Server 2000 is the latest and most powerful version of Microsoft's data warehousing and relational database management system.

Professional SQL Server 2000 Database Design provides an outline of the techniques that the designer can employ to make effective use of the full range of facilities that SQL Server 2000 offers. It attempts to move...

The Method of Moments in Electromagnetics
The Method of Moments in Electromagnetics
Responding to the need for a clear, up-to-date introduction to the field, The Method of Moments in Electromagnetics explores surface integral equations in electromagnetics and presents their numerical solution using the method of moments (MOM) technique. It provides the numerical implementation aspects at a nuts-and-bolts level...
The Art and Science of CSS
The Art and Science of CSS
In the early days of CSS, many web designers associated it with boring, square boxes and thin borders. “CSS is ugly!” they would cry. It took projects such as CSS Edge1 and CSS Zen Garden2 to show the web design world that not only could CSS designs achieve the same aesthetic qualities of their table-based ancestors, but, furthermore,...
Catastrophizing: Materialism and the Making of Disaster
Catastrophizing: Materialism and the Making of Disaster
When we catastrophize, we think the worst. We make too much of too little, or something of nothing. Yet what looks simply like a bad habit, Gerard Passannante argues, was also a spur to some of the daring conceptual innovations and feats of imagination that defined the intellectual and cultural history of the early modern...
Smart Client Architecture and Design Guide (Patterns & Practices)
Smart Client Architecture and Design Guide (Patterns & Practices)
Get expert, pragmatic guidance on how to design and build smart client solutions that combine the benefits of traditional, rich-client applications with the manageability of thin clients. Software architects and developers will learn how to evaluate whether a smart client solution is appropriate for their client architecture, and get practical...
Terminal Services for Microsoft Windows Server 2003: Advanced Technical Design Guide
Terminal Services for Microsoft Windows Server 2003: Advanced Technical Design Guide

This book is not an administrator’s guide. Rather, it’s written for IT consultants, system engineers, and architects who must plan, design, implement, and optimize Windows 2003-based Terminal Server systems. It's filled with real-world, proven strategies created specifically for Windows Server 2003. See how some of the world's...

Windows Vista All-in-One Desk Reference For Dummies (Computer/Tech)
Windows Vista All-in-One Desk Reference For Dummies (Computer/Tech)
9 books in 1—your key to Windows Vista survival!

Your one-stop guide to new Vista features, video, music, networks, cool hardware, and more

Tame and tease Vista's new features with the expert advice in these handy minibooks. From gadgets to glass, desktops to downloads, backups to...

Understanding Thin-Client/Server Computing (Strategic Technology Series)
Understanding Thin-Client/Server Computing (Strategic Technology Series)
From nontechnical managers to IT professionals, everyone with responsibility for networks wants answers to the problem of Total Cost of Ownership (TCO). And this book provides what may be the hottest answer yet. Here's thorough coverage of thin client technology for Microsoft Windows and Windows NT-technology that gives simple machines (even dumb...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy