|
|
|
|
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and... | | Real World Linux Security (2nd Edition)
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or... | | Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable AssetsInside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive... |
|
|
Joomla! 1.5 SEOSome sites always appear at the top of a search result while others fail to even make it to the top ten. Wouldn't you want to see your site on the first page of any search result? This is not easily feasible if you are depending solely on the marketing guys whom you hire for SEO.
Joomla! SEO will help you to attract more visitors and... | | Great Events From History: The 20th Century, 1941-1970This is a unique resource: Nothing is comparable with this much depth or numbers that covers so many 20th century events.??AAGreat Events from History: The Twentieth Century, 1941-1970??AA, is the ninth installment in Salem Press' ongoing ??AAGreat Events from History??AA series. This six-volume set contains 1,112 essays on more than 1,100... | | Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great... |
|
|
|
Result Page: 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 |