Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

Creating Innovative Products and Services
Creating Innovative Products and Services

Really new products and services are scarce, yet the need for them is huge. That's why Innovation is an important managerial instrument - but many of us struggle with how to approach it. Gijs van Wulfen's "Creating Innovative Products and Services" is an essential read for anyone involved in new product or service design,...

Expert MySQL (Expert's Voice in Databases)
Expert MySQL (Expert's Voice in Databases)

Expert MySQL is the leading reference for learning, understanding, and extending the MySQL server. It unlocks the full promise of open source by showing how to modify the code, create your own storage engine, build your own authentication plugins, and even add your own functions and commands to the SQL language. No other book...

ImageCLEF: Experimental Evaluation in Visual Information Retrieval
ImageCLEF: Experimental Evaluation in Visual Information Retrieval

The creation and consumption of content, especially visual content, is ingrained into our modern world. This book contains a collection of texts centered on the evaluation of image retrieval systems. To enable reproducible evaluation we must create standardized benchmarks and evaluation methodologies. The individual chapters in this book...

Conceptual Trigonometry Part I: A Companion to S. L. Loney's Plane Trigonometry Part I
Conceptual Trigonometry Part I: A Companion to S. L. Loney's Plane Trigonometry Part I
Conceptual Trigonometry Part I: A Companion to S. L. Loney's Plane Trigonometry Part I.

This work contains conceptual solutions to the problems and exercises given in the text book of Plane Trigonometry by S. L. Loney's including variations of problems, solutions, methods and approaches.

...
Object-Oriented Design Knowledge: Principles, Heuristics and Best Practices
Object-Oriented Design Knowledge: Principles, Heuristics and Best Practices
In order to establish itself as a branch of engineering, a profession must understand
its accumulated knowledge. In addition, software engineering as a branch
of engineering must take several basic steps in order to become an established
profession, highlighting understanding of the nature of its knowledge.

Software
...
Eclipse 3 Live
Eclipse 3 Live
Most of my computing life has been spent in Emacs starting back in 1990 building Obj-C applications for school. I fell in love with the multiple buffers the way I could quickly navigate back and forth between them. I could even run a make and have compiler errors jump me to the offending code, how cool is that! Well it was cool in 1990. Through the...
The Best Damn Firewall Book Period
The Best Damn Firewall Book Period

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more.

In the beginning, there were router access lists…

...
iOS 5 Recipes: A Problem-Solution Approach (Recipes Apress)
iOS 5 Recipes: A Problem-Solution Approach (Recipes Apress)

iOS 5 Recipes: A Problem-Solution Approach is your guide to developing solutions on iPad, iPhone, and other iOS 5 devices and platforms. This book provides in-depth code samples and discussions for scenarios that developers face every day. You'll find numerous examples of real-world cases that will enable you to build...

jQuery Mobile
jQuery Mobile

Mobile applications come in two basic flavors: native applications, which are compiled programs that run natively on the device, and mobile web applications, which run inside a web browser on the device.

Native applications get almost all of the press these days, especially given the financial success of the iTunes App Store...

Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the...
Hack Proofing XML
Hack Proofing XML
XML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy