|
|
|
|
OS X Lion Made Simple
So you have your brand new Mac, or perhaps you've upgraded to Lion on an existing desktop or laptop. Now what? OS X Lion Made Simple will guide you through all of the new features of Lion, as well as provide a thorough tour of the features and applications that are OS X standards. You'll discover how to make the most of... | | The Truth About Getting Your Point Across: ...and Nothing But the TruthWow, what a humbling challenge.
When I started working on The Truth About Getting Your Point Across with Prentice Hall, I did some serious soul-searching about how to approach the book to best relate to you, the busy reader who wants to get some good, practical advice quickly and then move on to the next item on your to-do list.... | | Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... |
|
|
Immunology: Mucosal and Body Surface Defences
2012 PROSE Award, Clinical Medicine: Honorable Mention
The vast majority of medically important pathogens infect their host across a body surface such as the skin, or across a mucosal tissue such as the respiratory tract or intestines, as these sites are the ones exposed to the external environment. By focusing on... | | Implementing and Developing Cloud Computing Applications
I was first exposed to what would become the Internet way back in 1969,
while I was still an undergraduate at Brandeis University working on
ARPANet, the forerunner to the present Internet, which operated at the
then blazing speed of 2,400 bps, ultimately increased to 50 Kbps (see
http://www.computerhistory.org/internet_history/). I... | | Cisco Secure Intrusion Detection SystemOrganizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to... |
|
Java Programming Interviews Exposed
If you are a skilled Java programmer but are concerned about the Java coding interview process, this real-world guide can help you land your next position
Java is a popular and powerful language that is a virtual requirement for businesses making use of IT in their daily operations. For Java programmers, this reality offers... | | McGraw-Hill's GMAT, 2008 EditionWelcome to the GMAT. Were we saying this to you in person, we might duck after speaking those words. For many people, there’s nothing remotely welcoming about the GMAT. To many business school applicants, the test appears to be the most painful hurdle they must clear in their admissions process, and the one for which their work experience has... | | Hacking: The Next Generation (Animal Guide)With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |