|
|
|
|
|
|
Java GarageEnter your Java Garage... where you do your work, not somebody else's. It's where you experiment, escape, tinker, and ultimately succeed.
Java Garage is not your typical Java book. If you're tired of monotonous "feature walks"... | | Programming Distributed Applications With Com & Microsoft Visual Basic 6.0Microsoft's DCOM is the key technology for enterprise development for the Windows platform. Written for the working Visual Basic developer or project manager, Programming Distributed Applications with COM and Microsoft Visual Basic 6.0 introduces the basics of DCOM objects in a clear style. All examples are written in Visual Basic, and the... | | Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |
|
The Art of Profitability'Interesting, concise... This little book packs quite a punch.' - Miami Herald
What do Barbie dolls, Nokia phones, and American Express credit cards have in common? They all represent a powerful business model called pyramid profit. How about Intel, Microsoft, and Stephen King? They all exploit another model called value chain... | | Embedded SoPC Design with Nios II Processor and Verilog Examples
Explores the unique hardware programmability of FPGA-basedembedded systems, using a learn-by-doing approach to introduce theconcepts and techniques for embedded SoPC design with Verilog
An SoPC (system on a programmable chip) integrates a processor,memory modules, I/O peripherals, and custom hardware acceleratorsinto a single FPGA... | | Defense and Detection Strategies against Internet WormsThis is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,... |
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |