|
|
|
|
UNIX Network Programming, Volume 2: Interprocess Communications (2nd Edition)This book describes four different forms of IPC in detail:
- message passing (pipes, FIFOs, and message queues),
- synchronization (mutexes, condition variables, read-write locks, file and record locks, and semaphores),
- shared memory (anonymous and named), and
- remote
... | | CompTIA Security+ Study GuidePrepare for CompTIA's updated Security+ exam
Validate your professional computer security expertise with certification that helps you stand out in the marketplace. This guide is your key to preparing for CompTIA's new Security+ SY0-201 exam, the first major revision of the exam since it was launched in 2002. Acquire hands-on skills and... | | Consumer Electronics Troubleshooting and Repair Handbook
* The ultimate troubleshooting and repair reference for professional technicians and hobbyists focuses on the most popular consumer electronic devices
* All major consumer electronics troubleshooting techniques--for the first time anywhere!
* Hundreds of illustrations clarifying effective troubleshooting and repair methods ... |
|
Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... | | | | |
|
|
|
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |