 |
|
|
 |  |  Stealing the Network: How to Own the BoxStealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real.While none of these specific events have happened, there is no reason why they could not.You could argue it provides a roadmap for criminal hackers, but I say it does something... |  |  Black Hat Physical Device Security: Exploiting Hardware and SoftwareAttacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,... |
|
 Special Edition Using FileMaker 8If you're looking for the inside scoop on the latest version of FileMaker, you've come to the right place. Authors Scott Love and Steve Lane are FileMaker experts who were involved in the development of FileMaker 8, and they bring that knowledge to you in ... |  |  |  |  |
|
|
| Result Page: 437 436 435 434 433 432 431 430 429 428 427 426 425 424 423 422 421 420 419 |