Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...

Expert .NET 2.0 IL Assembler
Expert .NET 2.0 IL Assembler

Expert .NET 2.0 IL Assember drills down into the internal structures and operations of the .NET common language runtime and teaches you how to master the IL assembly language, ILAsm. (The rule of thumb is that if the runtime can do it, ILAsm must be able to express it.) This book is ideal if you're a compiler and tool developer, a...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Thin Films and Coatings in Biology (Biological and Medical Physics, Biomedical Engineering)
Thin Films and Coatings in Biology (Biological and Medical Physics, Biomedical Engineering)

The surface of materials is routinely exposed to various environmental influences. Surface modification presents a technological challenge for material scientists, physicists, and engineers, particularly when those surfaces are subjected to function within human body environment. This book provides a comprehensive coverage of the major issues...

The Essential Guide to Flash CS4 with ActionScript
The Essential Guide to Flash CS4 with ActionScript
For any professional designer or developer working in the world of web technologies or multimedia, Flash is the must-have application, and knowing how to use it effectively is vital. Add in ActionScript 3.0, and Flash becomes an even more powerful tool for the development of high-performance web applications.

The Essential Guide to Flash...

Facebook: The Missing Manual (Missing Manuals)
Facebook: The Missing Manual (Missing Manuals)

Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum....

BizTalk Server 2002 Design and Implementation
BizTalk Server 2002 Design and Implementation

BizTalk Server 2002 Design and Implementation shows developers how to write BizTalk Server 2002 applications by example. Readers will learn BizTalk Server 2002 step-by-step as they read through the chapters and build an actual BizTalk Server application. Readers will also be exposed to the many invaluable lessons that Xin...

Thermal Comfort Assessment of Buildings (SpringerBriefs in Applied Sciences and Technology)
Thermal Comfort Assessment of Buildings (SpringerBriefs in Applied Sciences and Technology)

A number of metrics for assessing human thermal response to climatic conditions have been proposed in scientific literature over the last decades. They aim at describing human thermal perception of the thermal environment to which an individual or a group of people is exposed. More recently, a new type of “discomfort index” has...

Graphics Shaders: Theory and Practice, Second Edition
Graphics Shaders: Theory and Practice, Second Edition

Graphics Shaders: Theory and Practice is intended for a second course in computer graphics at the undergraduate or graduate level, introducing shader programming in general, but focusing on the GLSL shading language. While teaching how to write programmable shaders, the authors also teach and reinforce the fundamentals of...

Fundamentals of Structural Engineering
Fundamentals of Structural Engineering

Fundamentals of Structural Engineering provides a balanced, seamless treatment of both classic, analytic methods and contemporary, computer-based techniques for conceptualizing and designing a structure. The book?s principle goal is to foster an intuitive understanding of structural behavior based on problem solving experience for...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy