Home | Amazing | Today | Tags | Publishers | Years | Search 
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Observing the User Experience: A Practitioner's Guide to User Research
Observing the User Experience: A Practitioner's Guide to User Research

The gap between who designers and developers imagine their users are, and who those users really are can be the biggest problem with product development. Observing the User Experience will help you bridge that gap to understand what your users want and need from your product, and whether they'll be able to use what you've created.

...
The Rational Unified Process: An Introduction, Third Edition
The Rational Unified Process: An Introduction, Third Edition

The Rational Unified Process, Third Edition, is a concise introduction to IBM's Web-enabled software engineering process. Rational Unified Process®, or RUP®, Lead Architect Philippe Kruchten quickly and clearly describes the concepts, structure, content, and motivation that are central to the RUP. Readers will...

Internet & Intranet Security
Internet & Intranet Security

This extensively revised, new edition of the 1998 Artech House classic, Internet and Intranet Security, offers you an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall...

Pair Programming Illuminated
Pair Programming Illuminated

Pair programming is a simple, straightforward concept. Two programmers work side-by-side at one computer, continuously collaborating on the same design, algorithm, code, and test. It produces a higher quality of code in about half the time than that produced by the summation of their solitary efforts. However, nothing is simple...

Solaris System Management
Solaris System Management

Solaris System Management provides the system manager with the information they need to make the critical, higher level, "architectural" decisions such as large project rollouts and their impact.

Philcox addresses the specific needs of the system manager working in a Solaris environment focusing on task-oriented solutions for...

Policy Routing Using Linux
Policy Routing Using Linux
Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently...
CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition
CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition

Capability Maturity Model IntegrationSM (CMMI) has rapidly become a preferred means of improving organizational processes in industry and government. Building on a decade of work with process improvement models, including the Capability Maturity Model® (CMM®) for Software and the Systems Engineering Capability Model, a team of over two...

Perl Database Programming
Perl Database Programming
Here’s your in-depth guide to creating database-driven applications using Perl.

In this authoritative reference, Perl expert Brent Michalski uses plenty of examples to help you master Perl’s capabilities in database applications with MySQL, PostgreSQL, and Oracle. Along the way, he explores practical applications for cutting-edge...

Succeeding At Your Yahoo! Business
Succeeding At Your Yahoo! Business

The Yahoo! Stores have grown into one of the largest online shopping destinations on the Web today. The nearly 20,000 Yahoo! Stores have a 71% reach among online consumers, the highest on the Web. Many of these stores have become so successful that they have grown from small 'mom and pop' or part time businesses into full time...

ARM Architecture Reference Manual
ARM Architecture Reference Manual
The ARM architecture is the industry's leading 16/32-bit embedded RISC processor solution. ARM Powered microprocessors are being routinely designed into a wider range of products than any other 32-bit processor. This wide applicability is made possible by the ARM architecture, resulting in optimal system solutions at the crossroads of high...
The Focal Easy Guide to Adobe Audition 2.0
The Focal Easy Guide to Adobe Audition 2.0
"Very helpful are the copious and easy to interpret screenshots...Topics can be found easily."
 - Pro Audio Review, Aug. 2006

Software packages are complex. Shouldn't software books make it easier? Simplify your life with the Focal Easy Guide to Adobe ® Audition ® 2.0! This short, full-color book
...
Result Page: 2276 2275 2274 2273 2272 2271 2270 2269 2268 2267 2266 2265 2264 2263 2262 2261 2260 2259 2258 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy