|
|
Hacking Exposed: Network Security Secrets & SolutionsIn today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz... | | The Focal Easy Guide to Adobe Audition 2.0"Very helpful are the copious and easy to interpret screenshots...Topics can be found easily." - Pro Audio Review, Aug. 2006
Software packages are complex. Shouldn't software books make it easier? Simplify your life with the Focal Easy Guide to Adobe ® Audition ® 2.0! This short, full-color book... | | ARM Architecture Reference ManualThe ARM architecture is the industry's leading 16/32-bit embedded RISC processor solution. ARM Powered microprocessors are being routinely designed into a wider range of products than any other 32-bit processor. This wide applicability is made possible by the ARM architecture, resulting in optimal system solutions at the crossroads of high... |
|
Succeeding At Your Yahoo! BusinessThe Yahoo! Stores have grown into one of the largest online shopping destinations on the Web today. The nearly 20,000 Yahoo! Stores have a 71% reach among online consumers, the highest on the Web. Many of these stores have become so successful that they have grown from small 'mom and pop' or part time businesses into full time... | | SQL Server 7 Backup & RecoveryProtect your organization's most valuable asset--its data. Develop and implement a thorough data protection solution for your SQL Server 7 database environment. SQL Server 7 Backup & Recovery is your one-stop resource for planning, developing, implementing, and managing backup and restore procedures. Learn to execute data protection strategies,... | | Mac OS X and the Digital LifestyleAs a dedicated Mac user, you have experienced the power that applications like iMovie, iDVD, and iTunes can give you over your digital media. Ever wonder what you could do if you combined these tools with QuickTime, iPhoto, and iTools? The result is a complete digital lifestyle that allows you to master your digital domain. Mac OS X and the Digital... |
|
Computers & Typesetting, Volume A: The TeXbookThis guide to computer typesetting using TeX is written by Donald Knuth, the system's creator. TeX offers both writers and publishers the ability to produce plain or technical text, especially text containing a great deal of mathematics, comparable to the work of the finest printers. Novice and expert alike will find The TeXbook useful; it is... | | C#.net Web Developer's GuideThis volume teaches Web developers to build solutions for the Microsoft .NET platform. Web developers will learn to use C# components to build services and applications available across the Internet.
The focus of The C#.NET Web Developer’s Guide is on providing you with code examples that will help you leverage the... | | Hack Proofing Your Web ApplicationsAs a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some... |
|
|
Result Page: 2275 2274 2273 2272 2271 2270 2269 2268 2267 2266 2265 2264 2263 2262 2261 2260 2259 2258 2257 |