Mission Critical Internet Security The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This... Advanced ActionScript 3 with Design Patterns Today's ActionScript-based applications require increasingly sophisticated architectures and code. This book aids intermediate and advanced ActionScript developers in learning how to plan and build applications more effectively. You'll learn how to apply design patterns as solutions to common programming scenarios. Beyond a reference,... Cyber Adversary Characterization: Auditing the Hacker Mind A book about hacking is a book about everything.
First, the meaning of hacker.
The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine
Zenoss Core Network and System Monitoring As the world becomes more connected, the complexity of information technology is expanding. Information workers rely on an expanding number of technologies to collaborate: email, instant messaging, web forums, and wikis. Organizations that at one time relied solely on paper are becoming more dependent on information systems. In addition there is an... Undercover User Experience Design (Voices That Matter)
Once you catch the user experience bug, the world changes. Doors open the wrong way, websites don't work, and companies don't seem to care. And while anyone can learn the UX remedies usability testing, personas, prototyping and so on unless your organization 'gets it', putting them into practice is trickier. Undercover User...
The Two Income Trap: Why Middle-Class Mothers and Fathers Are Going Broke This groundbreaking exposé brings to light the surprising financial consequences of mothers going to work, and the precarious position of today's middle class.
More than two decades ago, the women's movement flung open the doors of the workplace. Although this social revolution created a firestorm of controversy, no one questioned the...
iPod & iTunes: Missing Manual, Second Edition In this freshly updated edition, New York Times tech columnist J. D. Biersdorfer blows open the secret doors of this gleaming, chrome-and-white beauty. With humor and authority, she lays bare an astonishing collection of useful tips, tricks, and shortcuts, and covers all iPod models for both Mac and Windows,... E-Commerce: A Control and Security Guide
Once scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and...
Stained Glass For Dummies (Sports & Hobbies)
Discover the artist within and create beautiful stained glass
Beautiful stained glass isn't reserved solely for church windows-it can be used to create intricate patterns in home windows, decorate cabinet doors, patio doors, ceilings, skylights, mirrors, lighting fixtures, garden decorations, and much more. Stained...
|Result Page: 7 6 5 4 3 2 1 |