|
|
|
|
Network+ Study Guide (2nd Edition)Here's the book you need to prepare for CompTIA's updated Network+ exam, N10-003.
This revised edition of the best-selling Network+ Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the focused and accessible instructional approach that has... | | Windows Vista: The Definitive GuideWhether you're a beginner, power user, or seasoned professional, Windows Vista: The Definitive Guide has everything you need to customize the operating system, master your digital media, manage your data, and maintain your computer -- regardless of which Windows Vista edition you're using.
Why this book and not some other resource?... | | Oracle 11g For Dummies (Computer/Tech)Are you a seasoned system administrator charged with setting up an Oracle database? Or did you suddenly become a DBA by default? If database administration with Oracle is part of your job, you’ll be glad to have Oracle 11g For Dummies in your cubicle.
This nuts-and-bolts guide walks you through the mysteries of Oracle and... |
|
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first... | | | | AdvancED Flex Application Development: Building Rich Media XMany Flex books cover the basics—this book does something different, and goes far further. The authors, leading Flash platform developers at Almer/Blank, working with Adobe User Group communities, are the creators of the Rich Media Exchange (RMX), a social media network for Adobe developers. In covering just how the RMX was built, this book... |
|
The CISSP Prep Guide: Mastering the Ten Domains of Computer SecurityA one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination
The CISSP Prep Guide
From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can... | | | | Beginning Cryptography with JavaBeginning Cryptography with Java
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.
This book teaches you how. Chapters one through... |
|
|
|
Result Page: 137 136 135 134 133 132 131 130 129 128 127 126 125 |