Flylib.com
index_K
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Y] [Z]
kaiten/knight bot
detection using antivirus
portability 2nd 3rd
relation to blended threats
Previous page
Table of content
Next page
Internet Denial of Service: Attack and Defense Mechanisms
ISBN: 0131475738
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Jelena Mirkovic
,
Sven Dietrich
,
David Dittrich
,
Peter Reiher
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Process Group ID
Message Queue Control
Semaphore Control
Transforming a Local Function Call into a Remote Procedure
Using Broadcasting to Search for an RPC Service
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Schedule Risk
Identifying Project Resource Risk
Managing Project Risk
Conclusion
Appendix A Selected Detail From the PERIL Database
Image Processing with LabVIEW and IMAQ Vision
Camera Interfaces and Protocols
Compression Techniques
Gray-Scale Operations
Frequency Filtering
Application Examples
Adobe After Effects 7.0 Studio Techniques
Effects & Presets
Combining Multiple Masks
Color Keying
Morphing
Conditionals and Triggers
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco Firewall Products
Enabling Application Inspection Using the Modular Policy Framework
MGCP
RTSP
VPN Management Using ASDM
Understanding Digital Signal Processing (2nd Edition)
UNDERSTANDING THE DFT EQUATION
FFT SOFTWARE PROGRAMS
LOW-PASS FIR FILTER DESIGN
IMPULSE INVARIANCE IIR FILTER DESIGN METHOD
A QUADRATURE OSCILLATOR
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies