|
|
|
|
| | Brute Force: Cracking the Data Encryption StandardIn the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved... | | UNIX and Linux Forensic Analysis DVD ToolkitThe only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account... |
|
Professional DotNetNuke Module ProgrammingProfessional DotNetNuke® Module Programming
As the force behind the creation of new functionality to DotNetNuke Web sites, DotNetNuke modules are reusable programming components that offer a way to extend the basic DotNetNuke framework. With this resource, you'll learn the best practices for DotNetNuke module development, and you'll gain a... | | Bayesian Argumentation: The practical side of probability (Synthese Library)
Relevant to, and drawing from, a range of disciplines, the chapters in this collection show the diversity, and applicability, of research in Bayesian argumentation. Together, they form a challenge to philosophers versed in both the use and criticism of Bayesian models who have largely overlooked their potential in argumentation. Selected from... | | Sams Teach Yourself DirectX 7 in 24 Hours (Teach Yourself -- Hours)From the first hour, Sams Teach Yourself DirectX 7 in 24 Hours has you creating your own DirectX-enabled applications. Author Robert Dunlop guides you through the complicated DirectX APIs, empowering you to create your own DirectX powered applications featuring smooth 3D graphics and sound. In addition to laying the COM-based DirectX foundation,... |
|
| | Adobe Dreamweaver CS5 with PHP: Training from the Source
My first encounter with PHP came about 10 years ago. By that time, I already had plenty of
experience developing websites. I had started out writing HTML in a text editor before settling
on Dreamweaver as my favorite authoring tool. A new project involved publishing more than
30 articles a day. It was a subscription service, so the... | | |
|
Cyber Terrorism: Political And Economic ImplicationsCyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed... | | Forensic Computer Crime InvestigationThe Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest... | | Managing Internetworks With SnmpManaging Internetworks with SNMP, Second Edition, is an invaluable guide for all network managers and administrators who maintain a complex internetwork. This comprehensive reference provides a technical understanding and practical application of SNMP, the protocol developed by the Internet community to simplify the management of... |
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 |