Home | Amazing | Today | Tags | Publishers | Years | Search 
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Mutual Fund Industry Handbook : A Comprehensive Guide for Investment Professionals
Mutual Fund Industry Handbook : A Comprehensive Guide for Investment Professionals

A behind-the-scenes look at the mutual fund industry

With more than 8,000 funds, more than $8 trillion in assets, and more than 87 million individual investors at the end of 2004, mutual funds—professionally managed pooled investment vehicles that give people the opportunity to participate in the securities market without...

Windows Vista Administration: The Definitive Guide
Windows Vista Administration: The Definitive Guide
Whether you're a system administrator responsible for hundreds of Windows clients, or a just a roomful of computers, this book will help you install, configure, and maintain Microsoft's newest OS. Written in jargon-free English that puts concepts in proper context, the book gives you a better understanding of Vista's innovations and capabilities,...
Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000
Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000

Everything you need to know about

  • Implementing the new XML features in Spreadsheet Portals and Web Services
  • Auditing spreadsheets provided by third parties
  • Making spreadsheets accessible to individuals with disabilities
  • Performing spreadsheet makeovers
  • Constructing...
Oracle Essentials: Oracle Database 11g
Oracle Essentials: Oracle Database 11g
Oracle is an enormous system, with myriad technologies, options, and releases. Most users-even experienced developers and database administrators-find it difficult to get a handle on the full scope of the Oracle database. And, as each new Oracle version is released, users find themselves under increasing pressure to learn about a whole range of new...
WebSphere Business Integration Primer: Process Server, BPEL, SCA, and SOA (The developerWorks Series)
WebSphere Business Integration Primer: Process Server, BPEL, SCA, and SOA (The developerWorks Series)
Introductory Guide to WebSphere Business Integration from IBM

 

Using WebSphere Business Integration (WBI) technology, you can build an enterprise-wide Business Integration (BI) infrastructure that makes it easier to connect any business resources and functions, so you can adapt more...

Oracle Database 11g DBA Handbook (Osborne Oracle Press)
Oracle Database 11g DBA Handbook (Osborne Oracle Press)
The Essential Resource for Oracle DBAs--Fully Updated and Expanded

Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new...

Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the...

X Internet: The Executable and Extendable Internet
X Internet: The Executable and Extendable Internet
Evolving from the current PSTN to Internet Telephony is not an easy task. … The two authors [of this book] are uniquely qualified to explain how this evolution can be architected. … Both authors have used their unique expertise to produce this very first book on the topic.
-From the Foreword by Roch Glitho, Ph.D.,
...
CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

Take charge of your career with CISA certification

Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content areas, including the most up-to-date regulations, IS...

Nessus Network Auditing, Second Edition
Nessus Network Auditing, Second Edition
In the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
...
Sams Teach Yourself Linux Security Basics in 24 Hours
Sams Teach Yourself Linux Security Basics in 24 Hours
This book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy