|
|
|
|
Email Security with Cisco IronPort (Networking Technology: Security)
The Cisco IronPort Email Security Appliances (ESA) have been deployed in thousands of networks to accept, filter, and deliver email messages. The ESA is easy to deploy and its security-filtering settings are effective right out of the box. However, many organizations are looking for more from their messaging environment... | | SyncML: Synchronizing and Managing Your Mobile DataEffective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a... | | Creating Effective JavaHelp (Java Series)
Effective, instantly available online help is a requirement for today's interactive applications. Until now, Java application developers have been forced to develop their own help system. That's no longer necessary. With the release of JavaHelp™, there is a complete and standard online help system for the Java™ platform.... |
|
|
|
The Book of CSS3: A Developer's Guide to the Future of Web Design
CSS3 is the technology behind most of the eye-catching visuals on the Web today, but the official documentation can be dry and hard to follow. Luckily, The Book of CSS3 distills the heady technical language of the CSS3 specification into plain English, so you can get started on your next project right away.
With... | | The Book of CSS3: A Developer's Guide to the Future of Web Design
CSS3 is the technology behind most of the eye-catching visuals on the Web. But the docs can be dry, murky, and full of dastardly caveats for inconsistent browser implementations.
This completely updated second edition of the best-selling Book of CSS3 distills the dense technical language of the CSS3 specification... | | Penetration Tester's Open Source Toolkit, Volume 2Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing... |
|
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 |