Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Game Developer's Market Guide (Game Development)
Game Developer's Market Guide (Game Development)
This book is for everyone involved in game development and for those who
want to break into the industry.
Calling someone a “game developer” covers a lot of territory. A developer might be
an artist making 3D models; a producer handling external development; a level
designer or composer; a programmer or writer. The
...
3ds max 4 Bible
3ds max 4 Bible
If 3ds max 4 can do it, you can do it, too … Take 3ds max 4 to the max — and join the ranks of the pros who've created animations for some of today's hottest games, movies, and TV shows. Packed with expert advice, time-saving tips, and more than 150 step-by-step tutorials, this all-in-one guide gets you up to speed quickly on the...
Building Parsers With Java
Building Parsers With Java
Parser building is a powerful programming technique that opens a world of opportunity for designing how users interact with applications. By creating mini-languages, you can precisely address the requirements of your application development domain. Writing your own parsers empowers you to access a database more effectively than SQL to efficiently...
Ultra-Wideband Wireless Communications and Networks
Ultra-Wideband Wireless Communications and Networks
Ultra-wideband (UWB) technology has great potential for applications in wireless communications, radar and location. It has many benefits due to its ultra-wideband nature, which include high data rate, less path loss and better immunity to multipath propagation, availability of low-cost transceivers, low transmit power and low interference. Despite...
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

LDAP Programming, Management, and Integration
LDAP Programming, Management, and Integration
Focusing on the practical application of the Lightweight Directory Access Protocol, this tutorial is geared toward IS professionals and software developers who are responsible for getting the maximum potential from their directories by integrating them with existing processes and applications. As the Internet standard for directory services, LDAP...
E-Ffective Writing for E-Learning Environments (Cases on Information Technology)
E-Ffective Writing for E-Learning Environments (Cases on Information Technology)

E-ffective Writing for E-Learning Environments integrates research and practice in user-centered design and learning design for instructors in post-secondary institutions and learning organizations who are developing e-learning resources. The book is intended as a development guide for experts in areas other than instructional or...

Beginning PHP and PostgreSQL E-Commerce: From Novice to Professional
Beginning PHP and PostgreSQL E-Commerce: From Novice to Professional

The PHP language and PostgreSQL database server have long offered an ideal blend of practicality and power for both the novice and experienced programmer alike. Yet the continued evolution of both technologies makes them better suited to drive enterprise-class applications than ever before. In Beginning PHP and PostgreSQL E-Commerce: From...

Professional BizTalk Server 2006
Professional BizTalk Server 2006
This book provides insight into how industry experts have successfully architected, developed, and maintained Microsoft BizTalk Server in mission-critical environments. Authored by highly-regarded consultants with a wealth of knowledge on designing, building, and operating enterprise applications using BizTalk, this comprehensive guide gives you...
Sams Teach Yourself Microsoft(R) Office 2007 All in One
Sams Teach Yourself Microsoft(R) Office 2007 All in One
Microsoft Corporation's Office products have an installed base of more than 25 million licensed users. More than 90% of the Fortune 500 companies use Microsoft Office. Microsoft completely redesigned the Office interface when it produced Office 2007. Microsoft's goal was to make the Office 2007 interface easier than ever to use, as well as more...
Patterns for Parallel Programming (Software Patterns Series)
Patterns for Parallel Programming (Software Patterns Series)

The Parallel Programming Guide for Every Software Developer

From grids and clusters to next-generation game consoles, parallel computing is going mainstream. Innovations such as Hyper-Threading Technology, HyperTransport Technology, and multicore microprocessors from IBM, Intel, and Sun are accelerating the...

unlimited object storage image
Result Page: 790 789 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy