|
|
|
|
|
| | Gray Hat Hacking, Second EditionUncover, plug, and ethically disclose security flaws
Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out... | | Delivering Carrier Ethernet: Extending Ethernet Beyond the LANEven as the value of Ethernet beyond the LAN was being widely recognized, the major challenge was the lack of clarity as to what this “Carrier Ethernet” entailed, and more generally, a lack of understanding of the delivery solutions over the diverse network infrastructures used by Service Providers. This was to a large extent... |
|
|
Network Security: A Beginner's Guide, Second EditionEssential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack... | | How To Do Everything with Your Tablet PCExplore the capabilities and benefits of your Tablet PC hardware and software with help from this easy-to-understand guide. Get a thorough run-through of your new device, as well as the Windows XP Tablet PC Edition operating system that runs on it. Once you've become familiar with the hardware and software features, follow helpful chapters that... | | Crystal Reports Professional ResultsCreate presentation-quality reports and complex, interactive analysis documents both on and off the Web with help from this thorough resource. Learn to use this powerful reporting tool to develop and design reports, make maps, tables, and charts, and much more. Produce visually appealing reports quickly and effectively, extract and present data... |
|
|
Result Page: 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 |