 |
|
|
|
|
 Cryptography for Internet & Database ApplicationsCryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest... |  |  |  |  Yahoo! Maps Mashups (Wrox Mashup Books)Your development world is about to greatly expand because of the new wave of Yahoo! Maps APIs. Written by Charles Freedman, a senior Flash developer at Yahoo!, this book provides you with all the information you'll need to know about these APIs in order to build amazing map mashups. You'll find in-depth coverage of Yahoo! mapping tools and... |
|
|
 Math You Can't Use: Patents, Copyright, and SoftwareThe field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means... |  |  The Book of Visual Studio .NETThe Book of Visual Studio .NET surveys each .NET server and related technologies, with a focus on Visual Studio 7 (VS7). Hands-on examples cover building forms, data retrieval, moving to COM+, and implementing web services. Other key issues and solutions include upgrading from Visual Basic, source control services, and remoting.
... |  |  Forgery and Memory at the End of the First Millennium
An in-depth exploration of documentary forgery at the turn of the first millennium
Forgery and Memory at the End of the First Millennium takes a fresh look at documentary forgery and historical memory in the Middle Ages. In the tenth and eleventh centuries, religious houses across Europe began... |
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 |