by
Patch, Kimberly.
Format:
Electronic Resources
Excerpt:
Index -- Knowing Who's Who -- Data, systems and objects -- Cracking codes -- DNA computers
by
Beale, Jay.
Format:
Electronic Resources
Excerpt:
, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of
View Other Search Results
by
Traxler, Julie.
Format:
Electronic Resources
Excerpt:
Applications is the only book specifically written for application developers and webmasters who write programs
by
Wang, Yun.
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-708-9
Format:
Electronic Resources
Excerpt:
professionals, and students and researchers who are interested in the use of statistical techniques for network
by
Carvey, Harlan.
Format:
Electronic Resources
Excerpt:
. This book also brings this material to the doorstep of system administrators, who are often the front
by
Archibald, Neil.
Format:
Electronic Resources
Excerpt:
guarded secrets to find out WHO is really attacking you over the internet. *Provides security
by
Shimonski, Robert.
Format:
Electronic Resources
Excerpt:
for any attacker who manages to penetrate your so-called hard perimeter. - There are currently no
by
Karakış, Emre, author.
Format:
Manuscript
Excerpt:
DDoS Flooding Attacks have been one of the major problems for service provider networks who encountered
by
Collins, Jon.
Format:
Electronic Resources
Excerpt:
those who are interested in the role.
by
Cross, Michael, 1965-
Format:
Electronic Resources
Excerpt:
2007 from {dollar}140 million in 2002 * Author Matt Fisher is a highly sought after speaker who
by
Ahmad, David R. Mirza.
Format:
Electronic Resources
Excerpt:
A new edition the most popular Hack Proofing book around! IT professionals who want to run secure
by
Sayin, Burcu, author.
Format:
Manuscript
Excerpt:
With Social Networks (SNs), being populated by a still increasing number of people, who take
Limit Search Results
Narrowed by: