Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...
Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...
Get up to speed on Word 2003's capabilities with concise, step-by-step tips from a Word expert!
Finally, readers without any Word experience have a book that was created just for them! This book is written for the reader who may be using Word for the very first time. Everything a reader needs to learn how...
The Java™ EE 5 Tutorial, Third Edition, is the definitive, task-oriented, example-driven guide to programming server-side applications with Sun Microsystems' new Java(TM) EE 5 platform. Written by members of Sun's Java EE 5 platform team, this book enables new and intermediate Java programmers to build...
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.
This book teaches you how. Chapters one through...
Hit the ground running with the detailed, road-tested deployment scenarios featured in Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed. Written by best-selling authors Michael Noel, who has been involved with the early beta of ISA Server 2004, and ...
JDBC 3.0 is the latest revision of Sun’s Java Database Connectivity API. Since its introduction on the market in the mid-90s, Java has evolved from a language and environment suited for applets to a rich enterprise platform. JDBC played a determinant role in Java’s maturation. JDBC is now used as a core technology...
A type system is a syntactic method for automatically checking the absence of certain erroneous behaviors by classifying program phrases according to the kinds of values they compute. The study of type systems--and of programming languages from a type-theoretic perspective--has important applications in software engineering, language design,...
The only Apple-authorized guide to Final Cut Express HD 3.5, this book delivers the techniques you need to make movie magic with DV or HDV footage. Each chapter presents a complete lesson in an aspect of video editing and finishing, with hands-on projects to complete as you go. All the files you need are on the included DVD-ROM. You'll learn how to...
Implement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...
The overwhelming majority of program bugs and computer crashes stem from problems of memory access, allocation, or deallocation. Such memory-related problems are also notoriously difficult to debug. Yet the role that memory plays in C and C++ programming is a subject often overlooked in courses and books because it requires specialized knowledge...