 |
|
 Wikipedia: The Missing ManualWhat made you write the book? In November 2006 I started working on an index for editors of Wikipedia – a single page that had links to all relevant policies, guidelines, how-to pages, reference pages, tools, and other things that an editor might conceivably want to read. The more I worked on the index, the... |  |  Applied Security VisualizationAPPLIED SECURITY VISUALIZATION
“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a... |  |  Object-Oriented Technology. ECOOP 2004 Workshop Reader: ECOOP 2004 Workshop, Oslo, Norway, June 14-18, 2004, Final Reports (Lecture Notes in Computer Science)This year, for the eighth time, the European Conference on Object-Oriented Programming (ECOOP) series, in cooperation with Springer, is glad to offer the object-oriented research community the ECOOP 2004 Workshop Reader, a compendium of workshop reports pertaining to the ECOOP 2004 conference, held in Oslo from June 15 to 19, 2004.
ECOOP... |
|
 Computeractive Guide to PC Tuning (Computer Active)Welcome to the third book in the Computeractive StepbyStep series. If you’ve read any of the others, you’ll know what to expect: a direct approach that leads you through everything you need to know about tuning your PC, with lots of examples and a step-by-step workshop at the end of each chapter.
As before, we avoid jargon... |  |  Presenting C# (Other Sams)C#(C Sharp) is a simple, modern, object-oriented and type-safe programming language that provides the simplicity of Visual Basic with the power of C++. Written by Christoph Wille, one of only a handful of developers with early access to this exciting new language, this book covers the C# language from the ground up with rich coding examples, and... |  |  |
|
 Network Security: A Practical Guide (Computer Weekly Professional)Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, from both an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those... |  |  |  |  |
|
|
Result Page: 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 |