 |
|
|
 |  |  Maximum Linux Security (2nd Edition)Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.
Maximum Linux Security helps Linux administrators identify and plug security holes... |  |  |
|
 Learning ASP.NET 3.5With this book, you will learn how to create engaging and interactive web applications using the latest version of the world's most popular web development platform: ASP.NET with AJAX, built on the productivity-enhancing features of Visual Studio 2008. All you need to get started is a basic knowledge of HTML and a desire to produce professional... |  |  Designing with FPGAs and CPLDs* Choose the right programmable logic devices and development tools * Understand the design, verification, and testing issues * Plan schedules and allocate resources efficiently Choose the right programmable logic devices with this guide to the technolog
Designing with FPGAs and CPLDs guides readers through choosing the right... |  |  Instant Vegas 5Nonlinear, or digital, editing permits editors to move film bites around and place them anywhere in the sequence of the film with much greater ease than was ever possible with conventional film editing techniques. Instant Vegas 5 is a PC-platform, nonlinear application distributed by Sony. Carefully detailed screenshots and step-by-step directions... |
|
 Usability Testing for Library Websites: A Hands-On GuidePeople acquire information from many sources other than libraries. For example, Barnes & Noble, Borders, and Amazon .com sell and distribute books, videos, and CDs and compete for the time and attention of our library’s customers. Barnes & Noble also provides children’s programming and Internet-related classes for families.... |  |  Maximum Windows 2000 Security (Maximum Security)Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.
Topics include:
Physical & File System Security,
Password Security,
Malicious Code,
Windows 2000 Network Security Architecture and Professional... |  |  Network Security Evaluation: Using the NSA IEMAre you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop... |
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |