Wireless Security Handbook This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this...
Flash 5 Bible "The must-have book for all Flash developers!"
—James Baker, Creative Director, the wddg
"The Flash 5 Bible is the book to have."
—Todd Purgason, Creative Director, Juxt Interactive
If Flash 5 can do it, you can do it too...
Whether you're a Web-development...
Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)
The Java™ EE 5 Tutorial, Third Edition, is the definitive, task-oriented, example-driven guide to programming server-side applications with Sun Microsystems' new Java(TM) EE 5 platform. Written by members of Sun's Java EE 5 platform team, this book enables new and intermediate Java programmers to build...
Patterns for e-business Get an inside look at how successful businesses build their e-business architectures. In this book, four IBM e-business experts capture years of experience into easy-to-follow guidelines. Deliberately focusing on Business patterns, Integration patterns, and Application patterns, the authors share with you proven architectural patterns that can help...
|Result Page: 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 |