|
|
|
|
Security of e-Systems and Computer NetworksE-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of... | | | | Negotiation at Work: Maximize Your Team's Skills with 60 High-Impact Activities
Negotiation is an essential part of doing business, but to be an effective negotiator one must master a wide variety of skills such as listening, self-awareness, conflict resolution, assertiveness, and more. So it stands to reason that in order to teach such a complicated subject, managers and trainers need proven, powerful activities.... |
|
Intrusion Detection in Wireless Ad-Hoc Networks
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including... | | Explorer's Guide to the Semantic WebWritten for developers and programmers, this guide acquaints users with the basic technologies and their interrelations that will be instrumental in the development of the Semantic Web. Key technology areas are covered, such as knowledge modeling (RDF, Topic Maps), agents (DAML, FIPA), and Trust and Authentication. This broad introduction ... | | Managing Trust in Cyberspace
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis... |
|
Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VBAs the only book to address ASP.NET 3.5, AJAX, and IIS 7 security from the developer’s point of view, this book begins with a look at the new features of IIS 7.0 and then goes on to focus on IIS 7.0 and ASP.NET 3.5 integration. You’ll walk through a detailed explanation of the request life cycle for an ASP.NET application running on IIS... | | | | |
|
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |