|
|
|
|
| | Pro PHP Security
The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your... | | Computing Information Technology: The Human SideFrom the senior management to the clerical and support group levels, this study addresses the possible pitfalls and triumphs of implementing information technology (IT) into organizations in terms of organizational strategies, structures, and communication methods. Issues of human-computer interaction, ethics, privacy, and security are raised to... |
|
|
| | Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)* From the garage to the living room, Geek House provides hackers with 10 PC-based hardware hacking projects that are not for the faint of heart! * Taking the DIY mentality to a whole new level, this book teaches techies how to hack, customize, and modify everything-from their sprinkler systems to the temperature of their barbecues ... | | Algorithm DesignAlgorithm Design introduces algorithms by looking at the real-world problems that motivate them. The book teaches a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the... |
|
|
|
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 |