Electronic Books

Total Books: 21 - 40 /55
Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...

Lire la suite
Distributed Applications and Interoperable Systems : 8th IFIP WG 6.1 International Conference, DAIS 2008, Oslo, Norway, June 4-6, 2008. Proceedings

This volume contains the proceedings of DAIS 2008, the 8th IFIP International Conference on Distributed Applications and ...

Lire la suite
Distributed Computing in Sensor Systems (vol. # 3560)

The book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, ...

Lire la suite
Distributed Computing in Sensor Systems ك 4th IEEE International Conference, DCOSS 2008 Santorini Island, Greece, June 11-14, 2008 Proceedings

The book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, ...

Lire la suite
Distributed and Parallel Systems

This book devoted to general algorithmic aspects of parallel and distributed computing and grid computing. This book includes ...

Lire la suite
Distributed and Parallel Systems

This book devoted to general algorithmic aspects of parallel and distributed computing and grid computing. This book includes ...

Lire la suite
Distributed and Parallel Systems : In Focus: Desktop Grid Computing

In this book contributors investigate parallel and distributed techniques, algorithms, models and applications; present innovative ...

Lire la suite
Foundation Website Creation with CSS, XHTML, and JavaScript

Foundation Website Creation with CSS, XHTML, and JavaScript covers the entire process of building a website. This process ...

Lire la suite
Hardening Windows

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which ...

Lire la suite
Honeypots for Windows

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, ...

Lire la suite
Job Scheduling Strategies for Parallel Processing (vol. # 3834)

Constitutes the refereed postproceedings of the 11th International Workshop on Job Scheduling Strategies for Parallel Processing, ...

Lire la suite
Measuring the Business Value of Cloud Computing

The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and ...

Lire la suite
Mobile Service Computing

This book introduces readers to the background and principles of mobile service computing. It discusses various aspects of ...

Lire la suite
Mule 2: A Developers Guide to ESB and Integration Platform

Mule 2: A Developer's Guide introduces the Mule 2.0 integration platform for developers of enterprise integration applications ...

Lire la suite
Multiagent Engineering

1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have ...

Lire la suite
Principles of Distributed Systems (vol. # 3544)

A collection of papers organized in topical sections on design of distributed systems, ad-hoc networks and mobile agents, ...

Lire la suite
Pro ASP.NET 1.1 in VB .NET

Pro ASP.NET 1.1 in VB.NET aims to be the definite reference for working developers in the field. Its compendium format covers ...

Lire la suite
Pro ASP.NET 2.0 in C# 2005

ASP.NET 2.0 is Microsoft's principal standard for creating dynamic web pages on the Windows platform. ASP.NET 2.0 boasts ...

Lire la suite
Pro ASP.NET 2.0 in VB.NET 2005

With its added improvements, ASP.NET 2.0 is becoming the standard technology for creating dynamic web pages on the Windows ...

Lire la suite
Pro ASP.NET 3.5 Server Controls and AJAX Components

Pro ASP.NET 3.5 Server Controls and AJAX Components is a reference for the serious ASP.NET developer who understands the ...

Lire la suite
Total Books: 21 - 40 /55