Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Best Damn Windows Server 2008 Book Period, Second Edition
The Best Damn Windows Server 2008 Book Period, Second Edition
In depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to
...
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

Microsoft SQL Server 2008 Reporting Services Unleashed
Microsoft SQL Server 2008 Reporting Services Unleashed

The authoritative, example-rich guide to Microsoft’s powerful reporting platform

With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL...

Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go
Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go

Use FileMaker® technologies to create powerful mobile data apps for iPhone®, iPod® touch, and iPad™

 

Apple’s FileMaker technologies make it easy to create powerful, data-driven apps for iPhone, iPod touch, iPad, and any mobile...

GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011

The fourth edition of the International Conference on Geospatial Semantics (GeoS 2011) was held in Brest, France, during May 12–13, 2011.

Geospatial semantics (GEOS) is an emerging research area in the domain of geographic information science. It aims at exploring strategies, computational methods, and tools to support...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Principles and Practice of Pediatric Surgery
Principles and Practice of Pediatric Surgery
In the preface to the text that preceded this edition, we predicted that the pace of change in the clinical practice of pediatric surgery, and in our understanding of the scientific principles that are the basis for that practice, would soon render the text obsolete. That expectation was more predictable than prescient,...
Java Performance: The Definitive Guide
Java Performance: The Definitive Guide

Coding and testing are often considered separate areas of expertise. In this comprehensive guide, author and Java expert Scott Oaks takes the approach that anyone who works with Java should be equally adept at understanding how code behaves in the JVM, as well as the tunings likely to help its performance.

You’ll...

Making Sense of Data: Designing Effective Visualizations
Making Sense of Data: Designing Effective Visualizations

You have a mound of data sitting in front of you and a suite of computation tools at your disposal. And yet, you’re stumped as to how to turn that data into insight. Which part of that data actually matters, and where is this insight hidden?

If you’re a data scientist who struggles to navigate the murky space...

Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

unlimited object storage image
Result Page: 205 204 203 202 201 200 199 198 197 196 195 194 193 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy