Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing XML
Hack Proofing XML
XML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document...
Essential XUL Programming
Essential XUL Programming
Start building XUL-based applications with this introduction to XUL and its technologies

With so many different programming languages and operating systems, developers have been clamoring for a single "meta-language" to develop user interfaces that are cross-platform and cross-device. Mozilla.org responded by creating
...
The Rational Unified Process Made Easy: A Practitioner's Guide to Rational Unified Process
The Rational Unified Process Made Easy: A Practitioner's Guide to Rational Unified Process
This book is a comprehensive guide to modern software development practices, as embodied in the Rational Unified Process, or RUP. With the help of this book's practical advice and insight, software practitioners will learn how to tackle challenging development projects--small and large--using an iterative and risk-driven development approach with a...
Seeing the Elephant: Understanding Globalization from Trunk to Tail
Seeing the Elephant: Understanding Globalization from Trunk to Tail

In the new millennium, it is nearly impossible for us to talk about basic concerns like food or gas prices, without examining global intersections in trade, energy, immigration, the environment, and defense. Many countries once described as "developing" nations now wield greater economic and political influence than some of the...

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition
Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition

The first edition of this book, Chemical Warfare Agents: Toxicity at Low Levels, was published just prior to the terrorist attacks of September 11th, 2001. Reflecting a greater sense of urgency within the field of chemical defense since this event, research related to chemical warfare agents (CWAs) continues to expand at a remarkable...

Microsoft Exchange Server 2003 24seven
Microsoft Exchange Server 2003 24seven
Advanced Coverage for Experienced Exchange Administrators

Microsoft Exchange Server 2003 24seven doesn't try to take you back to square one. Instead, it builds on the knowledge you've already earned. Expert Jim McBee with assistance from Barry Gerber delivers targeted instruction and inside tips that will help you...

Analysis of Air-Based Mechanization and Vertical Envelopment Concepts and Technologies
Analysis of Air-Based Mechanization and Vertical Envelopment Concepts and Technologies
The Army After Next (AAN) concept of rapidly deployable mechanized battleforces in a tactical environment requires the forces to be readilytransported by vertical, or near-vertical, lift aircraft. In the nonlinearAAN battlefield, this may require the forces to be deployed near the enemy1ssecond echelon. The authors examined the performance of the...
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
Nanomaterials and Plant Potential
Nanomaterials and Plant Potential

This book discusses the latest developments in plant-mediated fabrication of metal and metal-oxide nanoparticles, and their characterization by using a variety of modern techniques. It explores in detail the application of nanoparticles in drug delivery, cancer treatment, catalysis, and as antimicrobial agent, antioxidant and the...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Mastering Microsoft Exchange Server 2007
Mastering Microsoft Exchange Server 2007

By utilizing the latest features of Microsoft Exchange Server 2007, you'll be able to provide your company with the security it needs while enabling employees to access critical information regardless of their location or type of device.

Now with this comprehensive guide, you'll find out how to effectively install, configure, and manage...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy