|
|
|
|
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first... | | Microsoft Office Live For Dummies (Computer/Tech)Automate common tasks like managing projects, customers, and documents
The fun and easy way to share your data online and grow your business
Want to make Office Live work for you? Now you can get up and running quickly in all the basics with this nuts-and-bolts guide. From creating a Web site... | | Windows Vista Annoyances: Tips, Secrets, and HacksWindows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended.... |
|
Making Musical Apps: Real-time audio synthesis on Android and iOS
Pure Data (Pd) is a programming language for digital audio and more. Written by Miller Puckette in the 1990s and under active development ever since, Pd has established itself as one of the leading open-source packages for computer music, and it remains largely interoperable with its commercial cousin, Max/MSP. A Pd program, ... | | Hactivism and Cyberwars: Rebels with a CauseThis detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics describes the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. The authors provide an explanation of the different strands of hacktivism... | | Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fastZimbra is open-source server and client software for messaging and collaboration: email, group calendaring, contacts, and web document management and authoring. The Zimbra server is available for Linux, Mac OS X, appliances, and virtualization platforms. The Zimbra Web 2.0 Ajax client runs on Firefox, Safari, and IE, and features easy... |
|
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus... | | Programming Spiders, Bots, and Aggregators in JavaThe content and services available on the web continue to be accessed mostly through direct human control. But this is changing. Increasingly, users rely on automated agents that save them time and effort by programmatically retrieving content, performing complex interactions, and aggregating data from diverse sources. Programming Spiders,... | | Quicken All-in-One Desk Reference For DummiesYour one-stop guide to making the most of Quicken's great financial tools
What's harder — earning money, or managing it? For most of us, that's tough to answer, but this book and Quicken will make the "managing" part a lot easier. Eight convenient minibooks cover things like setting up Quicken, saving money... |
|
Mastering Windows Vista Business: Ultimate, Business, and EnterpriseIn-depth Coverage of Windows Vista Ultimate, Business, and Enterprise
Learn to install, configure, run, and troubleshoot the professional versions of Vista in this comprehensive new guide from two leading Windows authorities. From Vista's all-new interface, 32-bit/64-bit architecture, and advanced security features to its fantastic new... | | Biometric Recognition: Challenges and Opportunities
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric... | | Mastering Active Directory for Windows Server 2008Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000
If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical... |
|
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 |