|
|
|
|
|
| | Hacking Exposed LinuxGNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are... | | Macworld iPhone Superguide, Second EditionFor iPhone, iPod, iPod touch, Mac and Windows users, this book details and simplifies the best use of your iPhone features. This Second Edition brings back the popular iPhone Superguide, updated for iPhone, iPhone 3G, and iPod touch.
Our experts share how to master hidden features easily, connect to nearby... |
|
Understanding Cryptography: A Textbook for Students and PractitionersCryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a... | | | | Designing Security Architecture SolutionsThe first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security... |
|
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |