Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Web Data Management Practices: Emerging Techniques and Technologies
Web Data Management Practices: Emerging Techniques and Technologies
The Web revolution currently under way is making the Internet more and more central to our everyday lives. The amount of information available on the Web is increasing at an enormous rate, and almost everyday new services become available. The Internet is now widely used not only for B2B (business-to-business) and B2C (business-to-consumer)...
Don't Make Me Think: A Common Sense Approach to Web Usability, 2nd Edition (Voices That Matter)
Don't Make Me Think: A Common Sense Approach to Web Usability, 2nd Edition (Voices That Matter)
Even if every Web site could afford a usability expert (which they can't), there just aren't enough of us to go around. So I tried to boil down what I've learned over the years (principles like "Don't make me think" and "Get rid of half the words on each page, then get rid of half of what's left") into a short, profusely...
Star Schema The Complete Reference
Star Schema The Complete Reference

The definitive guide to dimensional design for your data warehouse

Learn the best practices of dimensional design. Star Schema: The Complete Reference offers in-depth coverage of design principles and their underlying rationales. Organized around design concepts and illustrated with detailed examples, this is a...

Algorithms and Computation: 21st International Symposium, ISAAC 2010
Algorithms and Computation: 21st International Symposium, ISAAC 2010

This volume contains the proceedings of the 21st Annual International Symposium on Algorithms and Computations (ISAAC 2010), held in Jeju, Korea during December 15–17, 2010. Past editions have been held in Tokyo, Taipei, Nagoya, Hong Kong, Beijing, Cairns, Osaka, Singapore, Taejon, Chennai, Taipei, Christchurch, Vancouver, Kyoto, Hong...

Cisco Voice over IP (CVoice) (Authorized Self-Study Guide) (2nd Edition)
Cisco Voice over IP (CVoice) (Authorized Self-Study Guide) (2nd Edition)

Master the basics of VoIP (Voice over IP) implementation with the Cisco authorized self-study book for CVOICE foundation learning

  • Master the basics of VoIP (Voice over IP) implementation, management and troubleshooting

  • Prepare for the...

Game Programming Gems 6 (Book & CD-ROM)
Game Programming Gems 6 (Book & CD-ROM)
Welcome to the sixth volume of the Game Programming Gems series. With team sizes constantly expanding, developers are finding themselves pushed to become increasingly specialized. This makes it important to have cutting-edge, ready-to-use material in your specialization, as well as resources that you can call upon if you need to work outside your...
Advanced Visual Basic 6: Power Techniques for Everyday Programs
Advanced Visual Basic 6: Power Techniques for Everyday Programs
In Advanced Visual Basic 6, leading Visual Basic expert Matthew Curland demonstrates powerhouse techniques programmers can use to write high-performance, robust, and reusable VB code. Readers learn how to leverage the close relationships between VB, COM, and OLE Automation, extending the envelope of VB's capabilities and...
Engineering a Compiler, Second Edition
Engineering a Compiler, Second Edition

The practice of compiler construction changes continually, in part because the designs of processors and systems change. For example, when we began to write Engineering a Compiler (eac) in 1998, some of our colleagues questioned the wisdom of including a chapter on instruction scheduling because out-of-order execution threatened to make...

WebGL: Up and Running
WebGL: Up and Running
In early 1994, Tim Berners-Lee put out an open call for a virtual reality specification for the Web; Mark Pesce and I answered. Only being able to afford one plane ticket, we sent Mark to Geneva to present our Labyrinth prototype at the first-ever World Wide Web Developers’ Conference. With typical bombast,...
Hacking: The Art of Exploitation
Hacking: The Art of Exploitation
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.

Hacking is the art of creating problem solving, whether used to find an unconventional solution to...

Tcl/Tk, Second Edition: A Developer's Guide
Tcl/Tk, Second Edition: A Developer's Guide
Tcl/Tk (Tool Command Language/Tool Kit) makes it fast and easy to implement any type of application, from games to network analyzers. Tcl/Tk is a full-bodied, mature programming platform used by NASA rocket scientists, Wall Street database experts, Internet designers, and open source programmers around the world. Tcl/Tk's multi-faceted and...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy