Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python 2.1 Bible
Python 2.1 Bible
If Python 2.1 can do it, you can do it too … Packed with crystal-clear explanations, hands-on examples, and a complete language reference, this authoritative guide gives you all the tools you need for rapid application development with Python 2.1. From variables, expressions, and other basics to XML, multimedia, and multithreading, Python...
Special Edition Using Microsoft(R) Windows(R) Vista
Special Edition Using Microsoft(R) Windows(R) Vista
Thank you for purchasing or considering the purchase of Special Edition Using Microsoft Windows Vista. It’s amazing the changes that nearly 20 years can bring to a computer product such as Windows. When we wrote our first Windows book back in the mid-1980s, our publisher didn’t even think the book would sell well enough to print more...
Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Windows Server 2003: The Complete Reference
Windows Server 2003: The Complete Reference

Master new features for a more secure, easier to manage, network

The Most Comprehensive Windows Server 2003 Resource Available!

Examine the architecture and understand the features of Windows Server 2003 with help from this thorough resource. Written by respected author Kathy Ivens, Windows Server 2003: The Complete...

Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach...
Special Edition Using XML Schema
Special Edition Using XML Schema

The Extensible Markup Language is one of the most controversial technologies to come into vogue in recent years. Starting with humble roots with the desire to create a simple subset of SGML, XML burst onto the scene to a fantastic fanfare from developers and hype from the press. As more people have started to adopt XML, more...

Fundamentals of Computer Security
Fundamentals of Computer Security

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key...

Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary is your full reference resource for all things cryptography.

Cryptography from A5/0 to ZRTP
 
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for
...
Web Services Security
Web Services Security

Minimize security risks in your system by successfully rolling out secure Web Services with help from this exceptional guide. Web Services Security covers everything network security professionals need to know, including details on Web Services architecture, SOAP, UDDI, WSDL, XML Signature, XML Encryption, SAML, XACML, XKMS, and...

XML Security
XML Security

Keep XML applications and documents secure with help from the leading authority in e-security

Get up to speed on XML and applied security technologies using this authoritative guide. Covering the fundamentals of XML structures and related security technologies--including XML signatures, XML encryption, and the XML key management...

Oracle PL/SQL Programming, 4th Edition
Oracle PL/SQL Programming, 4th Edition

For the past ten years, O'Reilly's Oracle PL/SQL Programming has been the bestselling book on PL/SQL, Oracle's powerful procedural language. Packed with examples and helpful recommendations, the book has helped everyone--from novices to experienced developers, and from Oracle Forms developers...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy