|
|
|
|
Configuring Sonicwall FirewallsEvery enterprise requires at least one firewall to provide the backbone for its network security architecture. Firewalls are the core component of your network’s security. The risks today have greatly increased, so the call for a stronger breed of firewall has been made. In the past, simple packet-filtering firewalls allowing... | | php|architect's Zend PHP 5 Certification Study GuideZend's new PHP 5 Certification Exam represent an excellent tool for professional PHP developers who want to distinguish themselves in their field. php|architect's Zend PHP 5 Certification Study Guide, edited and produced by the publishers of php|architect magazine, provides the most comprehensive and thorough preparation tool for developers who... | | Semantic-Based Visual Information RetrievalContent-based visual information retrieval (CBVIR) is one of the most interesting research topics in the last years for the image and video community. With the progress of electronic equipment and computer techniques for visual information capturing and processing, a huge number of image and video records have been collected. Visual information... |
|
| | Information ScienceFrom cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains... | | |
|
|
| | Survivability and Traffic Grooming in WDM Optical NetworksTechnological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the long-distance communication infrastructure in the twentieth century.Two major networks of networks, the public switched telephone network (PSTN) and the ... | | Unit Operations: An Approach to Videogame Criticism"Bogost challenges humanists and technologists to pay attention to one another, something they desperately need to do as computation accelerates us into the red zones of widespread virtual reality. This book gives us what we need to meet that challenge: a general theory for understanding creativity under computation, one that will apply... |
|
|
Result Page: Previous 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 Next |