As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Web 2.0 is more pervasive than ever, with business analysts and technologists struggling to comprehend the opportunity it represents. But what exactly is Web 2.0 -- a marketing term or technical reality? This fascinating book finally puts substance behind the phenomenon by identifying the core patterns of Web 2.0, and by introducing an...
Secure, reliable, and scalable, SQL Server 2008 delivers a dynamic, smart, and productive data platform for all your data-related needs and offers many new features that will change how you administer a database server. Among these new features is the ability to use Windows PowerShell 2.0 scripts to automate and manage various aspects of the...
This book provides state-of-the-art scientific and engineering research findings and developments in the area of mobile robotics and associated support technologies. It contains peer-reviewed articles presented at the CLAWAR 2008 conference. Robots are no longer confined to industrial manufacturing environments; rather, a great deal of interest is...
CCNP TSHOOT 642-832 Official Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the CCNP® TSHOOT exam. Senior instructor and best-selling author Kevin Wallace shares preparation hints and test-taking tips, helping you identify areas of weakness and...
If you want to use Adobe Flex to build production-quality Rich Internet Applications for the enterprise, this groundbreaking book shows you exactly what's required. You'll learn efficient techniques and best practices, and compare several frameworks and tools available for RIA development -- well beyond anything you'll...
This book is a practical, step-by-step guide to getting started with Microsoft Office 2010. You’ll learn how to create and edit essential office files—documents, spreadsheets, presentations, and more—quickly and efficiently.
You’ll also learn about all of the new updates included with Office 2010....
With Google Web Toolkit, Java developers can build sophisticated Rich Internet Applications (RIAs) and complete Web sites using the powerful IDEs and tools they already use. Now, with GWT 2, Google Web Toolkit has become even more useful. Essential GWT shows how to use this latest version of GWT to create production solutions...
Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...
Modeling problems in this book are addressed mainly from the computational viewpoint. The primary concerns are how to define an objective function for the optimal solution to a image analysis or computer vision problem and how to find the optimal solution. The solution is defined in an optimization sense because the perfect solution is...