 |
|
|
 Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
... |  |  The Thyroid Sourcebook (5th Edition) (Sourcebooks)The classic reference guide for living with thyroid disorder--now completely revised and updated
The New York Times called this book "an excellent source of information." The Thyroid Sourcebook features patient narratives; information on the complications of hypo- and hyperthyroidism, such as... |  |  The Culture of Vengeance and the Fate of American JusticeAmerica is driven by vengeance in Terry Aladjem's provocative account - a reactive, public anger that is a threat to democratic justice itself. From the return of the death penalty to the wars on terror and in Iraq, Americans demand retribution and moral certainty; they assert the "rights of victims" and make pronouncements against... |
|
 VHDL : Programming By ExampleTHE HANDS-DOWN FAVORITE USER'S GUIDE TO VHDLCOMPLETELY UPDATED TO REFLECT THE VERY LATEST DESIGN METHODS
CD-ROM WITH WORKING CODE EXAMPLES, VERIFICATION TOOLS AND MORE
No matter what your current level of expertise, nothing will have you writing and verifying concise, efficient VHDL descriptions of... |  |  IT Governance: How Top Performers Manage IT Decision Rights for Superior ResultsFirms with superior IT governance have more than 25% higher profits than firms with poor governance given the same strategic objectives. These top performers have custom-designed IT governance for their strategies. Just as corporate governance aims to ensure quality decisions about all corporate assets, IT governance links IT decisions with company... |  |  Blown to Bits: Your Life, Liberty, and Happiness After the Digital ExplosionEvery day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,... |
|
 Programming Microsoft SQL Server 2008 (PRO-Developer)
Written by industry professionals who have been working with SQL Server 2008 since the earliest code, this reference expertly covers the programming fundamentals for SQL Server 2008 with crucial real-world context and extensive code samples.
Get the hands-on programming instruction, practical examples, and best practices you... |  |  Active Directory Cookbook, 3rd EditionWhen you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura... |  |  Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs
This book is about building robots using Lego bricks and components. In the first section of the book (Part I) we will discuss why you might find an interest in robotics as a hobby, and why Lego is an ideal system to have a fast start and great results. If you're reading this book you probably own a Mindstorms set, so you already have an... |
|
Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 |