|
|
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
OpenBSD's stateful packet filter, PF, is the heart of the OpenBSD firewall and a necessity for any admin working in a BSD environment. With a little effort and this book, you'll gain the insight needed to unlock PF's full potential.
This second edition of The Book of PF has been completely updated and... | | Biometric Recognition: Challenges and Opportunities
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric... | | Robert Ludlum's The Bourne Legacy
In Robert Ludlum's ground-breaking career, no other character so captured and held the world's imagination as Jason Bourne. He appeared in three of Robert Ludlum's own #1 bestselling novels - The Bourne Identity, The Bourne Supremacy, and The Bourne Ultimatum - and they remain amongst Ludlum's most-read... |
|
|
Wedding Videography Start to Finish
Welcome to Wedding Videography: Start to Finish, a resource to help you step confidently
into the field of wedding videography. This book is designed to step the novice wedding
videographer through the process of starting a wedding-videography business, filming a
wedding, editing the wedding footage, and outputting the final product... | | Coding for Penetration Testers: Building Better Tools
My Dear Reader,
This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting... | | PeopleSoft for the Oracle DBA
This book is aimed at helping Oracle DBAs understand and use PeopleSoft technology. For the typical DBA, the introduction to PeopleSoft is likely to include some surprises, not all of them agreeable. Many—if not most—DBAs have to deal with many different databases, usually supporting different applications. Often they will want to... |
|
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk
with crowds of anonymous people. He sees skyscrapers and signage
extending to the horizon. There is a lot going on – people talking, walking,
playing, fighting, screaming, driving, and smiling. He sees a coffee shop
that excites his interest. He pulls... | | Special Edition Using XML Schema
The Extensible Markup Language is one of the most controversial technologies to come into vogue in recent years. Starting with humble roots with the desire to create a simple subset of SGML, XML burst onto the scene to a fantastic fanfare from developers and hype from the press. As more people have started to adopt XML, more... | | Hack This: 24 Incredible Hackerspace Projects from the DIY Movement
Join today’s new revolution in creativity and community: hackerspaces. Stop letting other people build everything for you: Do it yourself. Explore, grab the tools, get hands-on, get dirty…and create things you never imagined you could. Hack This is your glorious, full-color passport to the... |
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |