- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Software engineering for internet applications: Part 2
Part 2 book "Software engineering for internet applications" includes content: Discussion, adding mobile users to your community; voice (VoiceXML); scaling gracefully, search, planning redux; distributed computing with HTTP, XML, SOAP, and WSDL; metadata (and automatic code generation), user activity analysis, writeup.
240 p actvn 24/04/2024 4 0
Từ khóa: Software engineering, Internet applications, User activity analysis, Adding mobile users, Scaling gracefully, Distributed computing, Planning redux
Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1
Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1 includes contents: Chapter 1: computer forensics in today’s world; chapter 2: systems, disks, and media; chapter 3: the computer investigation process; chapter 4: acquiring data, duplicating data, and recovering deleted files; chapter 5: Windows, Linux, and macintosh boot processes; chapter 6: Windows and Linux Forensics; chapter 7: steganography and...
485 p actvn 26/03/2024 9 0
Từ khóa: The official CHFI, Computer hacking forensics investigators, Computer hacking, Computer forensics, Linux Forensics, Application password crackers
Ebook Securing IM and P2P applications for the enterprise: Part 1
Ebook Securing IM and P2P applications for the enterprise: Part 1 includes contents: Chapter 1 Introduction to Instant Messaging; Chapter 2 AOL Instant Messenger (AIM); Chapter 3 Yahoo! Messenger; Chapter 4 MSN Messenger; Chapter 5 ICQ; Chapter 6 Trillian, Google Talk, and Web-based Clients; Chapter 7 Skype; Chapter 8 Introduction to P2P.
261 p actvn 27/02/2024 11 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, AOL instant messenger, MSN messenger
Ebook Securing IM and P2P applications for the enterprise: Part 2
Ebook Securing IM and P2P applications for the enterprise: Part 2 includes contents: Chapter 9 Gnutella Architecture; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Chapter 13 Internet Relay Chat—Major Players of IRC; Chapter 14 IRC Networks and Security; Chapter 15 Global IRC Security; Chapter 16 Common IRC Clients by OS.
218 p actvn 27/02/2024 9 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, IRC Networks, Global IRC security
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Tài liệu học tiếng Anh
14 83008
12 23588
10 19626
Bộ sưu tập Kỹ thuật viễn thông
11 16551