 |
|
 Maximum Linux Security (2nd Edition)Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.
Maximum Linux Security helps Linux administrators identify and plug security holes... |  |  Sams Teach Yourself Macromedia Flash MX 2004 in 24 HoursSince its introduction in 1996, Macromedia Flash has become the standard for delivering high impact, vector-based graphics to the Web. Flash is deceptively simple at first, yet has great depth and flexibility.Sams Teach Yourself Macromedia Flash 5 in 24 Hours offers a clearly written, well-organized introduction to this powerful product, and gives... |  |  |
|
 |  |  Unix Unleashed/Book and CDGiven life by Turing Award winning Bell Labs computer scientist Ken Thompson at Murray Hill, N.J., in August 1969, UNIX spent its early years as a research curiosity. When I met up with Unix in the summer of '82, however, it already possessed the one characteristic that destined it to dominate a major chunk of the world's market for operating... |  |  E-government Research: Policy and ManagementVirtual technology is increasingly prevalent in all spheres of daily life, including infiltration into governmental policies, processes, infrastructures, and frameworks. E-Government Research: Policy and Management provides scholars and practitioners with a critical mass of research on the integration, management, implications,... |
|
 |  |  |  |  Online Newsgathering: Research and Reporting for JournalismJournalists used to rely on their notepad and pen. Today, professional journalists rely on the computerand not just for the writing. Much, if not all, of a journalists research happens on a computer.
If you are journalist of any kind, you need to know how to find the information you need online. This book will show you how to find... |
|
 Java Connector Architecture: Building Enterprise Adaptors (Kaleidoscope)Java Connector Architecture (JCA) presents the JCA and identifies the scope in which a JCA-based adapter operates. The book quickly moves to the design methodologies employed in adapter using the JCA. The book then progresses to information about testing and deploying adapters in a production environment. Java Connector Architecture defines a... |  |  Advances in Object-Oriented Data Modeling (Cooperative Information Systems)This book focuses on recent developments in representational and processing aspects of complex data-intensive applications.
Focuses on recent developments in representational and processing aspects of object-oriented data modeling, covering hot topics such as reverse engineering and work-flow modeling. Each chapter contains a... |  |  |
|
| Result Page: 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 |