Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning ASP.NET 2.0 Databases: From Novice to Professional
Beginning ASP.NET 2.0 Databases: From Novice to Professional
Welcome to the introduction. From this point on, you’ll discover the amazing world of ADO.NET,
inanimate computer desks, late-night coding sessions, evil bugs, functions, methods, properties,
and data. Seriously though, welcome to the world of databases in ASP.NET.

The idea for this kind of book isn’t new, but if
...
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

Managing Risk and Information Security: Protect to Enable
Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on is often beyond what they have been prepared for. The nature of securing an enterprise is daunting and overwhelming. There are no simple checklists or roadmaps for success. Many of the technical security skills a CISO has acquired during the early...
The Googlization of Everything: (And Why We Should Worry)
The Googlization of Everything: (And Why We Should Worry)
In the beginning, the World Wide Web was exciting and open to the point of anarchy, a vast and intimidating repository of unindexed confusion. Into this creative chaos came Google with its dazzling mission—“To organize the world’s information and make it universally accessible”—and its much-quoted motto, “Don’t be...
Reverse Engineering Code with IDA Pro
Reverse Engineering Code with IDA Pro

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and...

Electronics Sensors for the Evil Genius: 54 Electrifying Projects
Electronics Sensors for the Evil Genius: 54 Electrifying Projects
Electronic Sensors for the Evil Genius: 54 Electrifying Projects was created as a voyage of discover}* for children, adults, science buffs, and for those curious at heart of all ages. This book was designed to provide a spark for the curiosity seeker, as well as to inspire curious children, students, and adults alike toward experimentation...
The Little Black Book of Computer Viruses: The Basic Technology
The Little Black Book of Computer Viruses: The Basic Technology
This is the first in a series of three books about computer
viruses. In these volumes I want to challenge you to think in new
ways about viruses, and break down false concepts and wrong ways
of thinking, and go on from there to discuss the relevance of
computer viruses in today’s world. These books are not a call to a...
Electronic Gadgets for the Evil Genius : 28 Build-It-Yourself
Electronic Gadgets for the Evil Genius : 28 Build-It-Yourself
The do-it-yourself hobbyist market, particularly in the area of electronics, is hotter than ever. This books gives the “evil genius” loads of projects to delve into, from an ultrasonic microphone, to a body heat detector, and all the way to a Star Wars Light Saber. This book makes creating these devices fun, inexpensive, and easy....
Network Security Hacks
Network Security Hacks

Nowhere is the term hacker more misconstrued than in the network security field. This is understandable because the very same tools that network security professionals use to probe the robustness of their own networks also can be used to launch attacks on any machine on the Internet. The...

PowerPoint 2007 All-in-One Desk Reference For Dummies (Computer/Tech)
PowerPoint 2007 All-in-One Desk Reference For Dummies (Computer/Tech)
7 books in 1—your key to PowerPoint success!

Your one-stop guide to perfect presentations with PowerPoint 2007

Everybody uses PowerPoint, right? How can you make your presentations pop? Check this handy reference with its easy-to-use minibooks! Once you get going with all the cool new...

123 PIC Microcontroller Experiments for the Evil Genius
123 PIC Microcontroller Experiments for the Evil Genius

Microchip continually updates its product line with more capable and lower cost products. They also provide excellent development tools. Few books take advantage of all the work done by Microchip. 123 PIC Microcontroller Experiments for the Evil Genius uses the best parts, and does not become dependent on one tool type or version, to...

Oracle WebLogic Server 12c Advanced Administration Cookbook
Oracle WebLogic Server 12c Advanced Administration Cookbook

If you want to extend your capabilities in administering Oracle WebLogic Server, this is the helping hand you’ve been looking for. With 70 recipes covering both basic and advanced topics, it will provide a new level of expertise.

Overview

  • Learn how to set a WebLogic environment with stability, high...
unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy