|
|
|
|
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
... | | Underwater Acoustic Modeling: Principles, techniques and applicationsThe subject of underwater acoustic modeling deals with the translation of our physical understanding of sound in the sea into mathematical formulas solvable by computers. This book divides the subject of underwater acoustic modeling into three fundamental aspects: the physical principles used to formulate underwater acoustic models; the... | | Hardening Cisco Routers (O'Reilly Networking)
Master one single topic, and everything becomes clearer.
The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are... |
|
|
Hypochondriasis: Modern Perspectives on an Ancient MaladyHypochondriasis remains controversial, despite its 2000-year history. Although it is considered a mental disorder, hypochondriasis is often regarded as a defense mechanism, peculiar cognitive/ perceptual style, means of nonverbal communication, response to stress, abnormal illness behavior, personality trait, distinct personality disturbance, and... | | Getting the Most Out of Vacuum TubesThe purpose of this book is not to add another volume to the many excellent ones available on what makes the vacuum tube work. Rather, it is intended to shed light on the almost completely neglected subject of why these versatile devices sometimes do not work.
Informed scientists and engineers have frequently stated that the life of a... | | Ad Hoc Mobile Wireless Networks: Protocols and Systems
The authoritative guide to the state of the art in ad hoc wireless networking.
-
Reflects the field's latest breakthroughs
-
Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much... |
|
| | Hacking a Terror Network: The Silent Threat of Covert ChannelsFrom a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of... | | CCNA Exam Cram (Exam 640-802) (3rd Edition)“The CCNA exam is difficult and I would not have passed it if I did not have this book with me. The CCNA Exam Cram is an indispensable resource that guided me from the introduction of networking fundamentals to the application of networking theories. Whether you need to learn from scratch or just need a quick reference, this book is an... |
|
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |