 |
|
|
 Microsoft Windows Home Server Unleashed (2nd Edition)
This is the most comprehensive, practical, and useful guide to Windows Home Server, including Microsoft’s major updates in PowerPacks 1, 2, and 3. Top Windows expert Paul McFedries brings together tips, techniques, and shortcuts available nowhere else and presents them all in plain English for every Windows Home... |  |  Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend... |  |  Professional Xcode 3 (Wrox Programmer to Programmer)
A solid guide that responds to the active interest in Apple's Xcode tools
Apple's Xcode tools are a collection of applications and frameworks that are used to develop, test, and optimize applications primarily written for Mac OS X or the iPhone. The steady increase in sales of Apple computers has triggered a strong interest... |
|
|
 Digital Design for Computer Data Acquisition
This digital electronics text focuses on "how to" design, build, operate and adapt data acquisition systems. The material begins with basic logic gates and ends with a 40 KHz voltage measurer. The approach aims to cover a minimal number of topics in detail. The data acquisition circuits described communicate with a host computer... |  |  Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... |  |  Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your... |
|
Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 |