Home | Amazing | Today | Tags | Publishers | Years | Search 
Database System Concepts
Database System Concepts
Database management has evolved from a specialized computer application to a central component of a modern computing environment, and, as a result, knowledge about database systems has become an essential part of an education in computer science. In this text, we present the fundamental concepts of database management. These concepts include...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Introducing Microsoft  ASP.NET AJAX (Pro - Developer)
Introducing Microsoft ASP.NET AJAX (Pro - Developer)

Get an expert introduction to the new JavaScript enhancements (code-named "Atlas") for Microsoft ASP.NET 2.0. More than a basic AJAX (Asynchronous JavaScript And XML) script library, the Microsoft implementation brings object orientation to JavaScript, together with enhanced client-side and server-side controls that greatly simplify...

Hacking Exposed Web Applications, 2nd Ed.
Hacking Exposed Web Applications, 2nd Ed.

Implement bulletproof e-business security the proven Hacking Exposed way

Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,...

Design Pattern Formalization Techniques
Design Pattern Formalization Techniques
Software design is a fledgling discipline. When the “software crisis” came to be acknowledged during the late 1960s, software development projects have been marred by budget overflows and catastrophic failures. This situation has largely remained unchanged. Programmers still create poorly-understood systems of monstrous complexity which...
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Software visualization encompasses the development and evaluation of methods for graphically representing different aspects of software, including its structure, its execution, and its evolution. Software visualization combines techniques from areas like software engineering, programming languages, data mining, computer graphics, information...
Operating System Concepts
Operating System Concepts
Another defining moment in the evolution of operating systems

Small footprint operating systems, such as those driving the handheld devices that the baby dinosaurs are using on the cover, are just one of the cutting-edge applications you’ll find in Silberschatz, Galvin, and Gagne’s Operating System Concepts,...

Distributed Systems Architecture: A Middleware Approach
Distributed Systems Architecture: A Middleware Approach
Middleware is the bridge that connects distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, and programming languages. This book describes middleware from two different perspectives: from the viewpoint of the systems programmer and from the viewpoint of the...
Towards a Unified Modeling and Knowledge-Representation based on Lattice Theory: Computational Intelligence and Soft Computing Applications
Towards a Unified Modeling and Knowledge-Representation based on Lattice Theory: Computational Intelligence and Soft Computing Applications
By ‘model’ we mean a mathematical description of a world aspect. With the proliferation of computers a variety of modeling paradigms emerged under computational intelligence and soft computing. An advancing technology is currently fragmented due, as well, to the need to cope with different types of data in different application domains....
ebXML Simplified: A Guide to the New Standard for Global E Commerce
ebXML Simplified: A Guide to the New Standard for Global E Commerce
Discover how to implement ebXML solutions with this concise introduction to the essentials

ebXML is the new standard for business-to-business (B2B) data exchange and the cornerstone of the next generation of B2B applications. This emerging e-commerce standard leverages the flexibility of XML to build an e-commerce infrastructure. Written...

Oracle Database 10g PL/SQL Programming
Oracle Database 10g PL/SQL Programming
Write Robust PL/SQL Applications

Create dynamic client/server applications using PL/SQL and the comprehensive information contained in this authoritative volume. Expert Oracle insiders cover the features of PL/SQL, explain scripting semantics and syntax, and fully detail the PL/SQL functionality of Oracle Database 10g. You’ll...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Result Page: 769 768 767 766 765 764 763 762 761 760 759 758 757 756 755 754 753 752 751 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy