|
|
|
|
Network Attacks and Exploitation: A Framework
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate... | | Emotional Engineering vol. 2
In an age of increasing complexity, diversification and change, customers expect services that cater to their needs and to their tastes. Emotional Engineering vol 2. describes how their expectations can be satisfied and managed throughout the product life cycle, if producers focus their attention more on emotion. Emotional engineering... | | Creating Mobile Apps with jQuery Mobile - Second Edition
Create fully responsive and versatile real-world apps for smartphones with jQuery Mobile 1.4.5
About This Book
-
Learn how to integrate advanced features such as Geolocation, HTML 5 Video, and the Web Audio API into your web application
-
Enhance your efficiency by automating repetitive tasks...
|
|
| | | | Learning XML, Second EditionIn this new edition of the best selling title, the author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and... |
|
|
|
|
Result Page: 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 |