Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing XML
Hack Proofing XML
XML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document...
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Bluetooth Application Developer's Guide
Bluetooth Application Developer's Guide
Every so often, a new technology comes along that, by its very nature, will change the world.The automobile, the television, and the Internet are obvious examples of technologies whose impact upon the entire population has been so far-reaching that it is truly beyond measure. Bluetooth is not one of these technologies. Despite the massive amount of...
VB.net Developer's Guide
VB.net Developer's Guide
The Complete Guide to Developing Applications with VB.NET

The introduction of VB.NET has sent many Visual Basic gurus back to the drawing board! VB.NET introduces a new set of standards, protocols, and syntax that previous users of Visual Basic will need to learn to regain their guru status and be positioned to create enterprise-critical...

Managing and Securing a Cisco SWAN
Managing and Securing a Cisco SWAN
Wireless networking is all about freedom. Freedom is a worthy goal in its own right, and freedom in an organizational context pays dividends.

It’s tremendously cool to be able to sit down in an office or conference room, open your portable computer, and have instant connectivity to the resources you need to do your job.With
...
Hack Proofing Your Ecommerce Site
Hack Proofing Your Ecommerce Site
Hack Proofing Your E-Commerce Site was written in response to requests from readers of our first book, Hack Proofing Your Network: Internet Tradecraft. Many of you asked us for more detail on how to protect e-commerce sites, given the unique risk and exposure such...
MCSE Exam 70-296 Study Guide and DVD Training System
MCSE Exam 70-296 Study Guide and DVD Training System
So you want to be a Microsoft Certified Systems Engineer for Windows Server 2003? Not a bad idea.To stay competitive in today’s competitive IT world, you must not only possess the knowledge necessary to do your job, but you must also be able to prove to your employer (or potential employer) that you have the abilities and knowledge.The best...
Pro Tools 7 Session Secrets: Professional Recipes for High-Octane Results
Pro Tools 7 Session Secrets: Professional Recipes for High-Octane Results
Studio secrets, techniques, and tips For Pro Tools M-powered, LE, HD, and TDM Power Users!

This practical guide from two certified Pro Tools experts begins where most other Pro Tools books leave off—it's like having a high-level, hands-on studio session with your very own seasoned audio pros! Jump in...

Webmaster's Guide to the Wireless Internet
Webmaster's Guide to the Wireless Internet
Webmaster’s Guide to the Wireless Internet is intended to give you, the Webmaster, the skills and knowledge that you will need to add wireless Internet capability to your existing Web site, to build new wireless applications, and to help you understand the issues, both global and domestic, that exist...
Skype Me!: From Single User to Small Enterprise and Beyond
Skype Me!: From Single User to Small Enterprise and Beyond
You are going to love Skype Me! From Single User to Small Enterprise and Beyond. Here’s why: Michael Gough knows his stuff. Michael has also completed a remarkably difficult project around a remarkably cool product, Skype.

Michael is a busy guy. I have no idea where he found time to write a
...
How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy