In this book, Dan Zambonini hasn’t written a silver bullet. What
he’s written – through years of research, commercial success and
failures – is a manual to help you know what’s involved. He’s been
there and done it. Learnt the mistakes, recorded them here so we
can benefit. If you’re a...
At 1400 pages, Mastering Visual C++ 6 is the one-stop reference for programmers (beginners through experts) who want to learn Microsoft's powerful 32-bit Visual C++ development environment. The book's tutorial "framework" provides a complete introduction to Microsoft's Win 32 programming architecture that lets you quickly create...
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
When we began writing this book, we had a fundamental tenet: Write a clear handbook
for creating the organization’s IT audit function and for performing their IT audits. We
wanted this book to provide more than checklists and textbook theories but instead to
provide real-life practical guidance from people who have performed IT...
Unlock the amazing story buried in your presentation—and forget boring, bullet-point-riddled slides forever! Guided by communications expert Cliff Atkinson, you’ll walk you through an innovative, three-step methodology for increasing the impact of your presentation. Discover how to combine classic storytelling techniques...
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
HackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today's Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted...
Creating a good presentation is much more than just clicking a few dialog boxes and typing some text. It requires knowledge and planning-lots of it. With the PowerPoint 2007 Bible you will not only be able to build a presentation with PowerPoint, but you’ll also be able to explain why you made the choices you did, and you’ll...
This go-to-resource is a must-have for anyone using Project Server 2003! Written by a widely recognized authority on project management, QuantumPM, this in-depth approach to planning and implementing Microsoft Office Project Server 2003 is derived from the team's technical and practical client experiences. Microsoft Office Project...
Frommer's Japan is completely updated, and features gorgeous color photos of the sights and experiences that await you.
Our author has written about Japan for years, so she's able to provide valuable insights and advice. She'll steer you away from the touristy and the inauthentic and show you the real heart of the...
Utilize the most recent developments to combat challenges such as ice mechanics. The perfect companion for engineers wishing to learn state-of-the-art methods or further develop their knowledge of best practice techniques, Arctic Pipeline Planning provides a working knowledge of the technology and techniques for laying pipelines in the...