Narrow your search

Library

KU Leuven (1720)

ULiège (1561)

ULB (1415)

Odisee (1274)

UCLL (1259)

Thomas More Mechelen (1253)

VIVES (1248)

Thomas More Kempen (1247)

UGent (773)

VUB (759)

More...

Resource type

book (3151)

digital (505)

periodical (125)

dissertation (45)

map (4)

More...

Language

English (3396)

French (191)

German (119)

Dutch (54)

Spanish (12)

More...

Year
From To Submit

2006 (3819)

Listing 1 - 10 of 3819 << page
of 382
>>
Sort by

Book
Bridging the digital divide : innovation systems for ICT in Brazil, China, India, Thailand, and Southern Africa
Authors: ---
ISBN: 1912234351 1282030922 9786612030925 Year: 2006 Publisher: London : Adonis & Abbey,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
E-mail
Authors: ---
ISBN: 9045637995 9789045637990 Year: 2006 Volume: 3799 Publisher: Brussel Haarlem Easy Computing

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
2006 IEEE International Symposium on Information Theory
Author:
ISBN: 1424405041 142440505X 150909234X Year: 2006 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract

The performance of sphere decoding of block codes over a variety of channels is investigated. We derive a tight bound on the performance of maximum likelihood decoding of linear codes on q-ary symmetric channels. We use this result to bound the performance of q-ary hard decision sphere decoders. We also derive a tight bound on the performance of soft decision sphere decoders on the AWGN channel for BPSK and M-PSK modulated block codes. The performance of soft decision sphere decoding of arbitrary finite lattices or block codes is also analyzed.


Book
Guide to test, training, and exercise programs for IT plans and capabilities : recommendations of the National Institute of Standards and Technology
Authors: --- --- --- --- --- et al.
Year: 2006 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
A spatial overlay ranking method for a geospatial search of text objects
Authors: ---
Year: 2006 Publisher: Reston, Va. : U.S. Geological Survey,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Record keeping in a hybrid environment : managing the creation, use, preservation and disposal of unique information objects in context
Authors: ---
ISBN: 9781780630977 1780630972 Year: 2006 Publisher: Oxford, England Chandos Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book brings together key ideas about record keeping in a multi-media environment. Written by leading figures in the fieldComprehensive coverage of the topicContains the most up-to-date information.

Winternals defragmentation, recovery, and administration field guide
Author:
ISBN: 0080489877 9780080489872 9781597490795 1597490792 1423775481 9781423775485 1281035726 9781281035721 9786611035723 6611035729 1597491470 9781597491471 Year: 2006 Publisher: Rockland, MA Syngress Pub

Loading...
Export citation

Choose an application

Bookmark

Abstract

Provides information on Winternals tools that are used in many Microsoft networks worldwide. This book begins with a chapter describing the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. It also introduces a suite of Winternals solutions, including Recovery Manager.

Fundamentals of information systems
Authors: ---
ISBN: 0619215607 Year: 2006 Publisher: Boston, Mass. Thomson, Course Technology

Loading...
Export citation

Choose an application

Bookmark

Abstract

Penetration tester's open source toolkit
Authors: --- ---
ISBN: 1597490210 9781597490214 1423787625 9781423787624 0080489524 9780080489520 1281035564 9781281035561 Year: 2006 Publisher: Rockland, Mass. Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools.

A guide to MYSQL
Authors: ---
ISBN: 1418836354 Year: 2006 Publisher: Boston, Mass. Thomson

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 3819 << page
of 382
>>
Sort by