 |
|
 Fuzzing: Brute Force Vulnerability DiscoveryThe concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered... |  |  Adaptive FiltersAdaptive filtering is a topic of immense practical and theoretical value, having applications in areas ranging from digital and wireless communications to biomedical systems. Now, preserving the style and main features of the earlier award-winning publication, Fundamentals of Adaptive Filtering (2005 Terman Award), the author offers readers and... |  |  The Cold Fusion Web Database Construction KitThis is a one-stop resource for crating applications on the Web. Using step-by-step instructions and examples, anyone can walk through the entire process from initial design to final roll-out, thus creating a complete web-based application. With this powerful book/CD-ROM combination, readers can explore web applications and learn about some of the... |
|
 Flex 3: A Beginner's GuideEssential Skills--Made Easy!
Learn to program with Flex 3, the powerful tool for building multimedia-rich, interactive Flash applications for the Web. Flex 3: A Beginner's Guide is an easy-to-follow, fast-paced tutorial that allows you to fully grasp the fundamentals, including MXML, ActionScript, Flex Builder,... |  |  The New Media ReaderThis reader collects the texts, videos, and computer programs--many of them now almost impossible to find--that chronicle the history and form the foundation of the still-emerging field of new media. General introductions by Janet Murray and Lev Manovich, along with short introductions to each of the texts, place the works in their historical... |  |  The Future of the Internet--And How to Stop ItThis extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity—and reveals that it is sputtering precisely because of its runaway success. With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds... |
|
 Geekonomics: The Real Cost of Insecure SoftwareYou may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The... |  |  Access Denied in the Information AgeIt was to be expected that a new millennium should bring with it a flurry of observers claiming that we stand on the threshold of a new society. We have not been disappointed. The media excitement at the fantastic financial speculation on the high-tech and internet stock market is but one instance cited to support this claim. This new society is... |  |  Image-Based RenderingImage-based rendering (IBR) refers to a collection of techniques and representations that allow 3D scenes and objects to be visualized in a realistic way without full 3D model reconstruction. IBR uses images as the primary substrate. The potential for photorealistic visualization has tremendous appeal, and it is thus not surprising that IBR has... |
|
|
Result Page: 926 925 924 923 922 921 920 919 918 917 916 915 914 913 912 911 910 909 908 |