Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Java Design Patterns: A Tutorial
Java Design Patterns: A Tutorial

Design patterns have become a staple of object-oriented design and programming by providing elegant, easy-to-reuse, and maintainable solutions to commonly encountered programming challenges. However, many busy Java programmers have yet to learn about design patterns and incorporate this powerful technology into their work.

...

A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
Model SQL Server Databases That Work Better, Do More, and Evolve More Smoothly

Effective data modeling is essential to ensuring that your databases will perform well, scale well, and evolve to meet changing requirements. However, if you’re modeling databases to run on Microsoft SQL Server 2008 or 2005, theoretical
...
Intelligence: The Eye, the Brain, and the Computer
Intelligence: The Eye, the Brain, and the Computer
This book treats the question of how far we have come in understanding intelligence and in duplicating it mechanically. The major facets of intelligence--reasoning, vision, language and learning are discussed as an approach to contrasting biological intelligence with current computer realizations....
C# Primer: A Practical Approach
C# Primer: A Practical Approach
Now Stan Lippman brings you C# using his famed primer format. C# PRIMER is a
comprehensive, example-driven introduction to this new object-oriented programming
language.

C# is a cornerstone of Microsoft's new .NET platform. Inheriting many features from both
Java and C++, C# is destined to become the high-level programming
...
Preventing Web Attacks with Apache
Preventing Web Attacks with Apache

The only end-to-end guide to securing Apache Web servers and Web applications

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Advanced ASP.NET AJAX Server Controls For .NET Framework 3.5 (Microsoft .Net Development Series)
Advanced ASP.NET AJAX Server Controls For .NET Framework 3.5 (Microsoft .Net Development Series)
SERVER CONTROLS ARE AN INTEGRAL aspect of every ASP.NET application we build. They encapsulate browser appearance and server functionality in a reusable object. They can be used across multiple pages within a single ASP.NET application and across multiple ASP.NET applications. ASP.NET comes with a lot of prebuilt server controls. We have simple...
C++ Network Programming, Volume 2: Systematic Reuse with ACE and Frameworks
C++ Network Programming, Volume 2: Systematic Reuse with ACE and Frameworks

Do you need to develop flexible software that can be customized quickly? Do you need to add the power and efficiency of frameworks to your software? The ADAPTIVE Communication Environment (ACE) is an open-source toolkit for building high-performance networked applications and next-generation middleware. ACE's power and...

Java and JMX: Building Manageable Systems
Java and JMX: Building Manageable Systems

Java is now used with increasing frequency to develop mission-critical applications. Using Java Management Extensions (JMX) is the key to managing those applications. As JMX is increasingly accepted into the fields of embedded systems, enterprise systems, and telephony, it is clear that all Java developers will encounter JMX...

Windows Forensics and Incident Recovery
Windows Forensics and Incident Recovery

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...

Troubleshooting Linux(R) Firewalls
Troubleshooting Linux(R) Firewalls

When something goes wrong with your Linux firewall, you need to fix itright now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes:...

unlimited object storage image
Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy