โฆ 131,085 VOLUMES FOUND FOR "Intelligent Non-hierarchical Manufacturing Networks" (287 ms)
<P><B></B> In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. <B> </B>Explores the basic issues to be addressed by a ne
This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to aud
<P>This book is the first monograph ever on complex-valued neural networks, which lends itself to graduate and undergraduate courses in electrical engineering, informatics, control engineering, mechanics, robotics, bioengineering, and other relevant fields. It is useful for those beginning their stu
<P><B></B> In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. <B> </B>Explores the basic issues to be addressed by a ne
This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to aud
Packed with over 1400 entries and over 3000 links, this is the ONLY interactive encyclopedia for the networking and telecommunications industry. Updated to include coverage of all the latest technologies including Cisco, Microsoft, Nortel Networks, 3COM, and more.
Hack Proofing Your Wireless Network is an invaluable resource for implementing or administering a wireless network. War Driving (searching for random insecure wireless networks) is happening all over. To keep your personal and confidential information private and to keep prying eyes from surfing you
I bought this book because I was having trouble making sense out of the Twisted on-line documentation. I'm really a book guy, anyway, and felt I needed "The Book" for Twisted. When the first page equivalent of "Hello World" blows up on Python 2.6 because of some obscure deprecation issue, you know
<p>Grow your business, build your career, find more customers, and build a valuable support network of likeminded business people.</p><p>Networking is a crucial skill for all professionals and business owners. Quite simply, itโs a fast and effective way to build your business or career - and excelle
<DIV><p>Get the single resource that definesโand illustratesโthe rapidly evolving world of networking. The second edition of the award-winning MICROSOFTยฎ ENCYCLOPEDIA OF NETWORKING has been fully updatedโwith thousands of entries detailing the latest technologies, standards, products, and services.
The intent of this collection of original essays is to revitalize the study of kinship and exchange in a social network perspective. The collection combines studies of empirical systems of marriage and descent with investigations of the flow of material resources. This book marks the emergence of a
<P style="MARGIN: 0px">The one-stop guide to modern networking for every VMwareยฎ administrator, engineer, and architect</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">Now that virtualization has blurred the lines between networking and servers, many VMware specialists need a stronger unde
The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do ex
๐ฅ TRENDING TOMES
While spirit boards have sometimes received a negative reputation, they are a perfectly safe way to communicate when used properly. Sharing dozens of heartwarming tales and creepy encounters, silly games and life-changing occurrences, author Alexandra Chauran provides everything you need to know to
Drawing on the authorsโ research work from the last ten years, Mathematical Inequalities: A Perspective gives readers a different viewpoint of the field. It discusses the importance of various mathematical inequalities in contemporary mathematics and how these inequalities are used in different appl
<p>In this analysis of South Africa's postapartheid security system, Peter Vale moves beyond a realist discussion of interacting states to examine southern Africa as an integrated whole. Vale argues that, despite South Africa's manipulation of state structures and elites in the region for its own en
This resource is the authoritative guide to problematic areas of the head and neck for the surgical pathologist. With particular emphasis placed on diagnostic problems and differential diagnosis in addition to coverage of more common diagnostically straightforward lesions, youโll get the most comple