|
|
OSSEC Host-Based Intrusion Detection GuideNovember 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,... | | ASP.NET 3.5 For Dummies (Computer/Tech)ASP.NET 3.5 For Dummies is an all new version of the popular title that makes it easy for beginners to create dynamic, data-driven Web applications on the Microsoft platform. Wherever possible the book minimizes the amount of code you write by harnessing powerful design-time tools built into Visual Web Developer 2008 and its free version,... | | |
|
|
Engineering Optics (Springer Series in Optical Sciences)
Engineering Optics is a book for students who want to apply their knowledge of optics to engineering problems, as well as for engineering students who want to acquire the basic principles of optics. It covers such important topics as optical signal processing, holography, tomography, holographic radars, fiber optical communication, electro-... | | Principles of Cancer Genetics
This concise guidebook consolidates the main concepts of the cancer gene theory, and provides a framework for understanding the genetic basis of cancer. Focused on the most highly representative genes that underlie the most common cancers, the book is aimed at advanced undergraduates who have completed introductory courses in genetics,... | | Steiner Tree Problems In Computer Communication NetworksThe Steiner tree problem is one of the most important combinatorial optimization problems. It has a long history that can be traced back to the famous mathematician Fermat (1601 1665). This book studies three significant breakthroughs on the Steiner tree problem that were achieved in the 1990s, and some important applications of Steiner tree... |
|
Upgrading SAP (SAP R/3)The purpose of this book is to remove the veil of secrecy surrounding SAP upgrade techniques and concepts, and to provide the user with a detailed description of the steps needed for a successful implementation. This popular, but very complex software system must be constantly reconfigured and upgraded to accommodate its latest releases. This book... | | | | |
|
Result Page: Previous 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 Next |