|
|
|
|
| | Writing Security Tools and ExploitsExploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,... | | Large-Scale Software Architecture: A Practical Guide using UMLThis book is intended to be a practical guide. Our goal is to be brief. We cover only the essential information to guide software architects in defining the software architecture, providing pointers to further reading in lieu of detailed descriptions of this literature. Ideally, we can help software... |
|
Understanding the Local MediaHow will local media deal with the challenge of the Internet? How important is regional news to the nations of the UK? What does the future hold for newspapers, regional television and local radio news? Most adults in the UK read a local newspaper; regional news bulletins are among the most-watched on television; and local radio has a loyal... | | Asking the Right Questions: A Guide to Critical Thinking (8th Edition)The habits and attitudes associated with critical thinking are transferable to consumer, medical, legal, and general ethical choices. When our surgeon says surgery is needed, it can be life sustaining to seek answers to the critical questions encouraged in Asking the Right Questions This popular book helps bridge the gap between simply memorizing... | | |
|
|
|
|
Result Page: 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 |