Home | Amazing | Today | Tags | Publishers | Years | Search 
.NET Security
.NET Security
  • In-depth coverage of the cryptographic classes in .NET
  • Comprehensive analysis of the .NET security model
  • Detailed coverage of securing ASP.NET applications
  • Useful information on how to secure XML-based data under .NET

When you use .NET to create client- and server-side...

Configuring Cisco Routers for ISDN
Configuring Cisco Routers for ISDN

To say that Cisco Systems Inc. has a few products is like saying McDonalds sells a few hamburgers. Since 1984, Cisco has improved their original routers, enhancing features both in hardware and operating system software, mounting success upon success. Most of the "big iron" (that’s industry-speak for large expensive pieces of...

How to Do Everything with HTML & XHTML
How to Do Everything with HTML & XHTML

This step-by-step resource takes the fear and mystery out of using markup languages HTML and XHTML to build Web sites—it will help you through the process with friendly and familiar terms and techniques. You’ll cover all the basics, learn to add links, images, and data, and move on to advanced techniques such as animation, image...

Awesome 3d Game Development: No Programming Required
Awesome 3d Game Development: No Programming Required

Awesome 3D Game Development: No Programming Required teaches aspiring game developers how to create their own computer games without programming skills and provides an in-depth understanding of how the game design process works. Using hands-on tutorials and “drag-and-drop” game engines, readers learn to make and modify their...

Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)
Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system’s security infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003...

The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization
The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization

Perhaps the preeminent conventional fighting force in the world, the United States Marine Corps owes much of its modern-day success to the adoption of a combat philosophy known as maneuver warfare. Maneuver warfare uses speed, surprise, and concentrated force to exploit an opponent’s weakness and enables the Marines to achieve maximum...

Fundamentals of SVG Programming : Concepts to Source Code (Graphics Series)
Fundamentals of SVG Programming : Concepts to Source Code (Graphics Series)

Fundamentals of SVG Programming: Concepts to Source Code is a comprehensive guide to the core concepts of SVP programming, including the coordinate systems, color gradients, grid patterns, Bezier curves, transforms, charts, graphs, and more. Written for those new to SVG, this book does an excellent job of “marrying” SVG to...

Agile Software Development Ecosystems
Agile Software Development Ecosystems
This book describes--in depth--the most important principles of Agile development: delivering value to the customer, focusing on individual developers and their skills, collaboration, an emphasis on producing working software, the critical contribution of technical excellence, and a willingness to change course when demands shift. All major...
LAN Switching First-Step
LAN Switching First-Step

Your first step into the world of LAN switching

  • No LAN switching experience required

  • Includes clear and easily understood explanations

  • Makes learning easy

...
Secrets of the Game Business (Game Development Series)
Secrets of the Game Business (Game Development Series)
As the game industry continues to grow, you might be considering jumping in, but before you do, read what the insiders have to say and learn from their experiences. You'll explore the inner workings of the game development and publishing industry through the experiences and insights of industry experts. These publishing executives, developers,...
BSD Sockets Programming from a Multi-Language Perspective (Programming Series)
BSD Sockets Programming from a Multi-Language Perspective (Programming Series)

BSD Sockets Programming from a Multi-Language Perspective is written for software developers who need to create a variety of network applications. It begins by detailing the efficient and effective uses of the BSD Sockets API for networked application development in multiple languages. From there the BSD API is covered in detail and...

MPLS VPN Security
MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and...
Result Page: 1864 1863 1862 1861 1860 1859 1858 1857 1856 1855 1854 1853 1852 1851 1850 1849 1848 1847 1846 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy