2004 USENIX Annual Technical Conference Proceedings
Author :
Publisher :
Page : pages
File Size : 21,98 MB
Release : 2004
Category :
ISBN :
Author :
Publisher :
Page : pages
File Size : 21,98 MB
Release : 2004
Category :
ISBN :
Author : USENIX Association
Publisher :
Page : 296 pages
File Size : 19,80 MB
Release : 2004
Category : Operating systems (Computers)
ISBN : 9781931971218
Author : USENIX Association
Publisher :
Page : 230 pages
File Size : 23,36 MB
Release : 2004
Category :
ISBN : 9781931971225
Author :
Publisher :
Page : 348 pages
File Size : 47,4 MB
Release : 2003
Category : Computer networks
ISBN :
Author : Mihai Christodorescu
Publisher : Springer Science & Business Media
Page : 307 pages
File Size : 27,11 MB
Release : 2007-03-06
Category : Computers
ISBN : 0387445994
This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based techniques to analyze and detect obfuscated malware. The book analyzes current trends in malware activity online, including botnets and malicious code for profit, and it proposes effective models for detection and prevention of attacks using. Furthermore, the book introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage.
Author : Shih-Lin Wu
Publisher : CRC Press
Page : 660 pages
File Size : 16,86 MB
Release : 2007-03-28
Category : Computers
ISBN : 1420013823
The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday li
Author : Christa Kletter
Publisher : CRC Press
Page : 1402 pages
File Size : 25,94 MB
Release : 2001
Category : Botany, Medical
ISBN : 9780849300318
Increasingly, modern medicine relies on so called traditional or ancient medical knowledge. Holistic practices such as adhering to proper diet, observing rules for appropriate behavior, and administering medical preparations are coupled with the latest technology and methods to treat the whole patient. In light of this trend, there is much to be gained from understanding of one of the oldest medical systems still in existence. Tibetan Medicinal Plants provides you a detailed analysis of how Tibetan plants are used in this centuries old system. The book opens with a summary of Tibetan medicine and covers the various habitats in which the plants are found. The main part of this volume encompasses 60 monographs listed by the Tibetan plant name. Each monograph consists of several chapters addressing different topics related either to the Tibetan or the Western approach. Most of the monographs contain a description of the macroscopic and microscopic characteristics of the used plant parts, and anatomical features of 76 plants are provided. Each monograph presents an overview of the known chemical constituents and pharmacological properties of each plant and describes their use in Tibetan medicine. In contrast to other publications on Tibetan medicine, where translations of the Tibetan terms are given in other languages, this book treats the Tibetan word as a technical term, keeps the Tibetan term and explains its meaning, lessening confusion by reducing the number of translations. Traditional Tibetan medicine has been in existence for centuries. Curative practices existed in the prebuddistic era, and the art of healing developed more than 2500 years ago. Tibetan Medicinal Plants provides a comprehensive overview of all plant types, thus making it easier to grasp the Tibetan concept. It gives you a comprehensive look at this centuries old science.
Author : Walter Fumy
Publisher : John Wiley & Sons
Page : 264 pages
File Size : 10,65 MB
Release : 2013-08-01
Category : Computers
ISBN : 3895789097
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise. Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cryptographic techniques, intelligent tokens, public key infrastructures, IAM technologies) is provided. The book features detailed discussions of practical experiences in different sectors, including the automotive industry, financial services, e-health, and e-government.
Author : Fortino, Giancarlo
Publisher : IGI Global
Page : 335 pages
File Size : 40,64 MB
Release : 2012-06-30
Category : Computers
ISBN : 1466617950
"This book delivers state-of-the-art research on current and future Internet-based content delivery networking topics, bringing to the forefront novel problems that demand investigation"--
Author : Jie Wu
Publisher : CRC Press
Page : 893 pages
File Size : 26,86 MB
Release : 2005-08-08
Category : Technology & Engineering
ISBN : 1135484422
The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network paradigms. Filling the need for a comprehensive reference on recent developments, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks explores two questions: What are the central technical issues in these SAP networks? What are the possible solutions/tools available to address these issues? The editor brings together information from different research disciplines to initiate a comprehensive technical discussion on theoretical and algorithmic approaches to three related fields: sensor networks, ad hoc wireless networks, and peer-to-peer networks. With chapters written by authorities from Motorola, Bell Lab, and Honeywell, the book examines the theoretical and algorithmic aspects of recent developments and highlights future research challenges. The book's coverage includes theoretical and algorithmic methods and tools such as optimization, computational geometry, graph theory, and combinatorics. Although many books have emerged recently in this area, none of them address all three fields in terms of common issues.