Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Beginning Perl Web Development: From Novice to Professional
Beginning Perl Web Development: From Novice to Professional

Beginning Perl Web Development: From Novice to Professional introduces you to the world of Perl Internet application development. This book tackles all areas crucial to developing your first web applications and includes a powerful combination of real-world examples coupled with advice. Topics range from serving and consuming RSS feeds,...

DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
Learning Kendo UI Web Development
Learning Kendo UI Web Development

With Kendo UI you can enhance your websites no end without having to write a line of code, and this tutorial shows you exactly how to utilize the code library of JavaScript widgets and tools. Thoroughly practical, brilliantly inspiring.

Overview

  • Learn from clear and specific examples on how to utilize the...
XForms Essentials
XForms Essentials
XForms Essentials is an introduction and practical guide to the new XForms specification. Written by Micah Dubinko, a member of the W3C XForms working group and an editor of the specification, the book explains the how and why of XForms, showing readers how to take advantage of them without having to write their...
Web Systems Design and Online Consumer Behavior
Web Systems Design and Online Consumer Behavior

Web Systems Design and Online Consumer Behavior takes an interdisciplinary approach toward systems design in the online environment by providing an understanding of how consumers behave while shopping online and how certain system design elements may impact consumers' perceptions, attitude, intentions, and actual behavior. This book...

Object-Oriented Programming with Visual Basic .NET
Object-Oriented Programming with Visual Basic .NET

This book is not a reference. That needs to be said right off the bat. It was written to be read cover to cover; it tells a story. It's an interwoven tale about object-oriented programming in the .NET world: building objects, moving them, and using them around the world. This is not just a how-to book; it's a why-to and a when-to...

The Art of Agile Development
The Art of Agile Development

The Art of Agile Development contains practical guidance for anyone considering or applying agile development for building valuable software. Plenty of books describe what agile development is or why it helps software projects succeed, but very few combine information for developers, managers, testers, and customers into a single...

Upgrading & Fixing Laptops For Dummies (Computer/Tech)
Upgrading & Fixing Laptops For Dummies (Computer/Tech)
Keep your laptop on top of its game!

Find out how to care for your laptop, what can go wrong, and what you can fix

A laptop is much more than a PC that shrank. It has unique needs, and this book shows you how to meet them. You'll discover how to diagnose and fix common problems, replace parts, add external upgrades, and develop...

Head First Networking
Head First Networking
Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory...
Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

Biophysical Techniques in Photosynthesis (Advances in Photosynthesis and Respiration)
Biophysical Techniques in Photosynthesis (Advances in Photosynthesis and Respiration)
Progress in photosynthesis research is strongly dependent on instrumentation. It is therefore not surprising that the impressive advances that have been made in recent decades are paralleled by equally impressive advances in sensitivity and sophistication of physical equipment and methods. This trend started already shortly after...
unlimited object storage image
Result Page: 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy