|
|
|
|
RESPONSIBLE RESPONSIVE DESIGN
Contents: - Responsible Design - Sustainable Detection - Planning for Performance - Delivering Responsibly. "Responsive design has immeasurably improved multi-device, multi-browser visual layout-but it's only the first step in building responsively. Learn how to turn a critical eye on your designs as you develop for new contexts... | | Kali Linux Cookbook
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Overview
-
Recipes designed to educate you extensively on the penetration testing principles and Kali...
| | Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
|
| | Advances in Visual Computing: 6th International Symposium, ISVC 2010, Part III
The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereed proceedings of the 6th International Symposium on Visual Computing, ISVC 2010, held in Las Vegas, NV, USA, in November/December 2010. The 93 revised full papers and 73 poster papers presented together with 44 full and 6 poster papers of 7 special tracks were... | | Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
| | Optimizing Oracle PerformanceOracle DBAs and developers are all too familiar with the outlay of time and resources, blown budgets, missed deadlines, and marginally effective performance fiddling that is commonplace with traditional methods of Oracle performance tuning. In Optimizing Oracle Performance, Cary Millsap, former VP of Oracle's System... | | Hack Proofing Linux : A Guide to Open Source SecurityHack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.
First, we show you how to obtain... |
|
|
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 |