|
|
|
|
|
BackTrack 4: Assuring Security by Penetration Testing
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your... | | Inside Microsoft SQL Server 2005: T-SQL Programming (Pro-Developer)This thorough, hands-on reference for database developers and administrators delivers expert guidance on sophisticated uses of Transact-SQL (T-SQL)—one of the most familiar and powerful programming languages for SQL Server. Written by a T-SQL guru, this guide focuses on language features and how they are interpreted and processed by the... | | Planning for Survivable NetworksKeep your network safe from security disasters with a dependable recovery strategy
Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.
In the information-packed pages of this book, Annlee Hines shares her... |
|
| | | | Realistic Image Synthesis Using Photon MappingThe creation of realistic three-dimensional images is central to computer graphics. Photon mapping, an extension of ray tracing, makes it possible to efficiently simulate global illumination in complex scenes. Photon mapping can simulate caustics (focused light, such as shimmering waves at the bottom of a swimming pool), diffuse inter-reflections... |
|
|
|
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 |