Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Application Security: Iberic Web Application Security Conference, IBWAS 2009
Web Application Security: Iberic Web Application Security Conference, IBWAS 2009

IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized by both the OWASP Portuguese and Spanish chapters in order to join the international Web application security academic and industry communities to present and discuss the major aspects of Web applications security.

...

Boardroom Secrets: Corporate Governance for Quality of Life
Boardroom Secrets: Corporate Governance for Quality of Life
Trust is the foundation of development both in relations among humans, as well as in relations between institutions such as the firm and its stakeholders. As the world continues to get smaller, the mutual interdependence of the corporations and their stakeholders grows larger. To achieve...
FrontPage 2003 (The Missing Manual)
FrontPage 2003 (The Missing Manual)
In today's highly connected world, almost everybody has a web site, from local sewing circles to the world's largest corporations. If you're ready for one of your own, Microsoft's FrontPage 2003 has everything you need to create Web pages. It's true. Your geek friends may howl in contempt if you use FrontPage, but that's because the program has a...
CWNA: Certified Wireless Network Administrator Study Guide (Exam PW0-100)
CWNA: Certified Wireless Network Administrator Study Guide (Exam PW0-100)
One of the fastest-growing certifications on the market, CWNA is rapidly becoming the premier professional wireless certification for network administrators. It is also the foundation-level exam for the complete Certified Wireless Network Professional program. Now you can join the move to Wi-Fi and prepare for your certification with this...
International Investments (The Addison-Wesley Series in Finance)
International Investments (The Addison-Wesley Series in Finance)
Almost thirty years ago, Bruno Solnik published an article entitled "Why not diver. sify internationally rather than domestically?" in the Financial Analysts Journal Uuly/August 1974). At the time, US. pension funds had never invested outside of the United States. The situation was not very different in most other countries...
Getting Back to Work: Everything You Need to Bounce Back and Get a Job After a Layoff
Getting Back to Work: Everything You Need to Bounce Back and Get a Job After a Layoff
The layoff survival guide for today's job hunters--what everyone needs to know about getting fired, getting inspired, and getting hired. Losing a job can be devastating-financially, professionally, and emotionally. This comprehensive guide, written by a career consultant with a background in psychiatric therapy, goes further than other job search...
Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
Data Mining with Microsoft SQL Server 2000 Technical Reference
Data Mining with Microsoft SQL Server 2000 Technical Reference
With its state-of-the-art capabilities for rapidly processing and retrieving huge quantities of data, Microsoft® SQL Server 2000 is quickly growing in popularity among large corporations. But learning how to take advantage of the powerful, built-in data-mining services in SQL Server to turn all that data into meaningful information takes time...
Going to Extremes: How Like Minds Unite and Divide
Going to Extremes: How Like Minds Unite and Divide
Why do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?

In
...
Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Beginning VB 2008: From Novice to Professional
Beginning VB 2008: From Novice to Professional

This book is for anyone who wants to write good Visual Basic 2008 code – even if you have never programmed before.

Writing good code can be a challenge, there are so many options, especially in a language like Visual Basic. If you want to really get the best from a programming language you need to know which features work...

CTOs at Work
CTOs at Work

Scott Donaldson, Stanley Siegel and Gary Donaldson interview many of the world's most influential chief technology officers in CTOs at Work, offering a brand-new companion volume to the highly acclaimed elite At Work books including Coders at Work, CIOS at Work and...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy