Home | Amazing | Today | Tags | Publishers | Years | Search 
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Absolute Beginner's Guide to Microsoft Office Word 2003
Absolute Beginner's Guide to Microsoft Office Word 2003

Get up to speed on Word 2003's capabilities with concise, step-by-step tips from a Word expert!

Finally, readers without any Word experience have a book that was created just for them! This book is written for the reader who may be using Word for the very first time. Everything a reader needs to learn how...

Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)
Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)

The Java™ EE 5 Tutorial, Third Edition, is the definitive, task-oriented, example-driven guide to programming server-side applications with Sun Microsystems' new Java(TM) EE 5 platform. Written by members of Sun's Java EE 5 platform team, this book enables new and intermediate Java programmers to build...

Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Hit the ground running with the detailed, road-tested deployment scenarios featured in Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed. Written by best-selling authors Michael Noel, who has been involved with the early beta of ISA Server 2004, and ...
JDBC 3: Java Database Connectivity
JDBC 3: Java Database Connectivity

JDBC 3.0 is the latest revision of Sun’s Java Database Connectivity API. Since its introduction on the market in the mid-90s, Java has evolved from a language and environment suited for applets to a rich enterprise platform. JDBC played a determinant role in Java’s maturation. JDBC is now used as a core technology...

Types and Programming Languages
Types and Programming Languages

A type system is a syntactic method for automatically checking the absence of certain erroneous behaviors by classifying program phrases according to the kinds of values they compute. The study of type systems--and of programming languages from a type-theoretic perspective--has important applications in software engineering, language design,...

Apple Pro Training Series: Final Cut Express HD
Apple Pro Training Series: Final Cut Express HD
The only Apple-authorized guide to Final Cut Express HD 3.5, this book delivers the techniques you need to make movie magic with DV or HDV footage. Each chapter presents a complete lesson in an aspect of video editing and finishing, with hands-on projects to complete as you go. All the files you need are on the included DVD-ROM. You'll learn how to...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Memory as a Programming Concept in C and C++
Memory as a Programming Concept in C and C++

The overwhelming majority of program bugs and computer crashes stem from problems of memory access, allocation, or deallocation. Such memory-related problems are also notoriously difficult to debug. Yet the role that memory plays in C and C++ programming is a subject often overlooked in courses and books because it requires specialized knowledge...

Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications

Proven techniques and patterns for enterprise development.

  • Design guidelines for EJB 2.0 component architecture
  • Powerful patterns for enterprise application design
  • Extensive real-world code examples
  • Covers every type of component, including message-driven beans

This...

Result Page: 479 478 477 476 475 474 473 472 471 470 469 468 467 466 465 464 463 462 461 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy