Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

...

Software Piracy Exposed
Software Piracy Exposed
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software...
Pro SQL Server 2008 XML (Expert's Voice in SQL Server)
Pro SQL Server 2008 XML (Expert's Voice in SQL Server)
Back in 1999, I was working for a dot-com when I was first exposed to the interesting new technology known as XML. My imagination ran wild, and I immediately began working on dozens of applications for XML, like custom reporting from our legacy inventory system and Web-based business-to-business ordering. I was as excited as a kid on...
The Poison Paradox: Chemicals As Friends and Foes
The Poison Paradox: Chemicals As Friends and Foes
To appreciate the dangers and the risks from chemicals of all kinds it is necessary to understand how, when and why they are toxic. This falls within the field of toxicology and is what this book is all about.

I was encouraged to write the book by Dr John Emsley, who is well known for his popular science books on
...
The Linear Algebra a Beginning Graduate Student Ought to Know
The Linear Algebra a Beginning Graduate Student Ought to Know

Linear algebra is a living, active branch of mathematics which is central to almost all other areas of mathematics, both pure and applied, as well as to computer science, to the physical, biological, and social sciences, and to engineering. It encompasses an extensive corpus of theoretical results as well as a large and rapidly-growing body...

Interface Oriented Design
Interface Oriented Design
Interface-Oriented Design explores how you can develop software with interfaces that interact with each other. We’ll look at techniques for breaking down solutions into these interacting interfaces and then for determining appropriate implementations for these interfaces to create well-structured...
Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

To have a successful career as a Cisco Certified Network Associate (CCNA), it is imperative that you understand the terminology used by individuals in the field of networking. To communicate effectively with peers and staff, you need to have a firm grasp on concepts and jargon you will be exposed to as a CCNA. Understanding basic terms and...

Windows NT File System Internals : A Developer's Guide
Windows NT File System Internals : A Developer's Guide
Writing kernel-mode Windows NT programs--such as file-system drivers (FSDs), filter drivers, and antivirus programs--poses a challenge to even experienced Windows programmers. It's hard enough to get these programs to work, but getting them to live peacefully with other kernel programs and NT itself is an art. Nagar sorts through the mechanics...
Hardening Network Infrastructure
Hardening Network Infrastructure
Bulletproof your system before you are hacked! From the publisher of the international best-seller, Hacking Exposed, here is a brilliant new offering written with a passion for security that will help you make the necessary upgrades and take the essential steps to secure your network infrastructure. The concise and consistent approach...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

HTML5 Graphing & Data Visualization Cookbook
HTML5 Graphing & Data Visualization Cookbook
Today, the Web and the world are increasingly being defined by data. With the data revolution of the Internet in the early nineties and until today, more and more data has been exposed and aggregated, from government agencies, public sector information, financial information, digital media and news, and social media to private...
Siege: Trump Under Fire
Siege: Trump Under Fire

Michael Wolff, author of the bombshell bestseller Fire and Fury, once again takes us inside the Trump presidency to reveal a White House under siege.

Just one year into Donald Trump’s term as president, Michael Wolff told the electrifying story of a White House consumed by controversy, chaos, and...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy