|
|
|
|
|
Writing Secure Code, Second EditionIf you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web-based or Win32-based, you need this book. Finally, if you are currently learning or building Microsoft .NET Framework–based applications, you need this book. In short, if you are involved in building... | | Joel on SoftwareThis is a selection of essays from the author's Web site, http://www.joelonsoftware.com. Joel Spolsky started the web log in March 2000 in order to offer his insights, based on years of experience, on how to improve the world of programming. His extraordinary writing skills, technical knowledge, and caustic wit have made him a programming guru.... | | HackNotes(tm) Linux and Unix Security Portable ReferenceHackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and... |
|
|
Perfect Passwords: Selection, Protection, AuthenticationUser passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According... | | | | Physics Modeling for Game ProgrammersProgrammers who want to include 3D math and physics in a game have to wade through physics textbooks and dreary tomes on linear algebra and group theory, only to find that the material is too abstract to be used directly in their games. This book gives readers the skills they want and need to incorporate real physics into their games. As they work... |
|
|
Result Page: 805 804 803 802 801 800 799 798 797 796 795 794 793 792 791 790 789 788 787 |