|
|
|
|
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... | | Advanced Java NetworkingAdvanced Java Networking gives the reader a well-rounded and fairly detailed introduction to Java networking technologies. The subjects Sridharan covers sound like a seminar list from a software development conference: IDL/CORBA, RMI, JDBC/SQL, JavaBeans, Castanet, JMAPI, servlets, and JavaOS, to name a few. But this isn't a dilettantish... | | |
|
Bitter EJBAfter taking a ten-year break from writing books, Bruce Tate returned to publishing in 2002 with the bestseller, Bitter Java. In Bitter Java, he introduced the concept of antipatterns, which he defined simply as common programming problems that trap software... | | MPLS VPN SecurityA practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and... | | |
|
Where the Germs Are: A Scientific Safari"'Dirty! Don't touch! Yuck! Feh! You don't know where it's been!' These admonitions ring in our ears-for some of us our earliest memories of parental exhortation, for others the indelible mark of our deepest fears. Germs, as we know, are everywhere, lying in wait to attack the inadequately vigilant or insufficiently armed, gangs of serial... | | Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky ... | | Hypertension: Methods and Protocols (Methods in Molecular Medicine)
A collection of new and essential molecular techniques for cardiovascular research. These readily reproducible methods range widely from producing congenic, consomic, transgenic, and knockout models of hypertension to the gene transfer of specific genetic material using nonviral (polymers, liposomes, and antisense agents) and adenoviral... |
|
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |