Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Security Basics (Networking)
Web Security Basics (Networking)

In our business world, Web sites have become a powerful marketplace that can capsize a company when attacked by a virus or hacker. Server security is critical to the survival of e-business. While the Internet has improved the way business is conducted, it has also added new rules to play by. With this book, you can take the necessary steps today...

Getting Started With OpenVMS: A Guide for New Users (HP Technologies)
Getting Started With OpenVMS: A Guide for New Users (HP Technologies)

This book is intended to introduce the reader to Hewlett-Packard’s OpenVMS operating system. It assumes some familiarity with modern computer operating systems, such as UNIX or Microsoft Windows. It will also be helpful to the reader to have access to an OpenVMS system upon which to try the examples given in this book.

Those...

Programming Jakarta Struts
Programming Jakarta Struts
As popular as the Struts Framework for building web applications with Servlets and JSPs is becoming, the online documentation is inadequate, focusing on the most basic functionality and leaving out information crucial to developers writing today's complex web applications. O'Reilly's Programming Jakarta Struts was written by Chuck Cavaness...
Six Sigma and Beyond:  Design for Six Sigma, Volume VI
Six Sigma and Beyond: Design for Six Sigma, Volume VI
This volume addresses design improvement from the perspective of prevention by introducing readers to the tools of the Six Sigma design process, and discusses DFSS (DCOV), and provides linkages between the traditional DMAIC and the DFSS model.

In this volume of the Six Sigma and Beyond series, quality engineering expert D.H....

C++ Plus Data Structures, Third Edition
C++ Plus Data Structures, Third Edition
C++ Plus Data Structures is designed for a course in Data Structures where C++ is the programming language. The book focuses on abstract data types as viewed from three different perspectives: their specification, their application, and their...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Mastering Crystal Reports 9
Mastering Crystal Reports 9

Mastering Crystal Reports 9 covers basic reporting skills, but its main purpose is to give you the complete coverage other books don’t offer. You’ll not only thoroughly learn the powerful features of Crystal Reports 9, but also how to develop custom applications to meet the specific needs of your organization. With...

Air Pollution Science for the 21st Century, Volume 1 (Developments in Environmental Science)
Air Pollution Science for the 21st Century, Volume 1 (Developments in Environmental Science)

Acid rain, ozone photochemistry, long-range transport of pollutants, greenhouse gas emissions and aerosols dominated tropospheric air pollution research in the last 30 years of the 20^^ century. At the start of the 2V^ century, acid rain is subject to planned improvement in Europe and North America, but is a growing problem in Asia....

BizTalk Server 2002 Design and Implementation
BizTalk Server 2002 Design and Implementation

BizTalk Server 2002 Design and Implementation shows developers how to write BizTalk Server 2002 applications by example. Readers will learn BizTalk Server 2002 step-by-step as they read through the chapters and build an actual BizTalk Server application. Readers will also be exposed to the many invaluable lessons that Xin...

Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

Mobile Telecommunications Protocols for Data Networks
Mobile Telecommunications Protocols for Data Networks
Technology has changed our lives and the way we see the world. The growing use of mobile technologies in phones, computers and everyday applications has fuelled the demand for efficient connectivity, irrespective of the location of the device. This connectivity has to be provided by various different networks and protocols that guarantee the smooth...
The Handbook of Brain Theory and Neural Networks: Second Edition
The Handbook of Brain Theory and Neural Networks: Second Edition
Dramatically updating and extending the first edition, published in 1995, the second edition of The Handbook of Brain Theory and Neural Networks presents the enormous progress made in recent years in the many subfields related to the two great questions: How does the brain work? and, How can we build intelligent machines?

Once
...
Result Page: Previous 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy