Home | Amazing | Today | Tags | Publishers | Years | Search 
Wi-Foo : The Secrets of Wireless Hacking
Wi-Foo : The Secrets of Wireless Hacking

The definitive guide to penetrating and defending wireless networks.

Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any...

The .NET Developer's Guide to Windows Security (Microsoft Net Development Series)
The .NET Developer's Guide to Windows Security (Microsoft Net Development Series)

The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on...

.NET Compact Framework Programming with C# (Microsoft Net Development Series)
.NET Compact Framework Programming with C# (Microsoft Net Development Series)

.NET Compact Framework Programming with C# is the definitive tutorial and reference for the .NET Compact Framework (CF). It shows you how to transfer your skills and your code to the Pocket PC 2003 and other mobile and embedded smart devices.

...
Institutionalization of Usability : A Step-by-Step Guide
Institutionalization of Usability : A Step-by-Step Guide

At one time, computer hardware was the key differentiator in information technology—what gave an organization it's competitive edge. Then, as hardware prices fell, software took center stage. Today, software having become a broadly shared commodity, a new differentiator has emerged—usability. Applications, including...

UML for Mere Mortals(R)
UML for Mere Mortals(R)

Need to get results with UML...without unnecessary complexity or mind-numbing jargon? You need UML for Mere Mortals®. This easy-to-read introduction is perfect for technical professionals and business stakeholders alike: anyone who needs to create, understand, or review UML models, without becoming a hard-core modeler.

...
The Design and Implementation of the FreeBSD Operating System
The Design and Implementation of the FreeBSD Operating System

As in earlier Addison-Wesley books on the UNIX-based BSD operating system, Kirk McKusick and George Neville-Neil deliver here the most comprehensive, up-to-date, and authoritative technical information on the internal structure of open source FreeBSD. Readers involved in technical and...

Seeing Data : Designing User Interfaces for Database Systems Using .NET
Seeing Data : Designing User Interfaces for Database Systems Using .NET

Nowadays, users and clients demand exceptionally usable software. But few developers are trained to create high-quality user interfaces, and few .NET books offer much help—until now.

In Seeing Data...

Aspect-Oriented Software Development with Use Cases
Aspect-Oriented Software Development with Use Cases

Aspect-oriented programming (AOP) is a revolutionary new way to think about software engineering. AOP was introduced to address crosscutting concerns such as security, logging, persistence, debugging, tracing, distribution, performance monitoring, and exception handling in a more effective manner. Unlike conventional development...

Microsoft Content Management Server 2002: A Complete Guide
Microsoft Content Management Server 2002: A Complete Guide

Content Management Server (CMS) is fast becoming a vital content-management tool that helps administrators and developers handle the ever-increasing amount of content on their Web sites. However, an authoritative source of product information has been missing . . . until now.

...

Data Access Patterns: Database Interactions in Object-Oriented Applications
Data Access Patterns: Database Interactions in Object-Oriented Applications

Efficient, high-quality data access code is crucial to the performance and usability of virtually any enterprise application-and there's no better way to improve an existing system than to optimize its data access code. Regardless of database engine, platform, language, or application, developers repeatedly encounter the same...

Introduction to Computer Security
Introduction to Computer Security

In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security...

Effective Enterprise Java
Effective Enterprise Java

If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to:

  • Use in-process or local storage to avoid the network

    ...
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy