Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
Programming Erlang: Software for a Concurrent World
Programming Erlang: Software for a Concurrent World
Erlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.

Moore's Law is the observation that the amount you can do on a single chip...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Internet Communication and Qualitative Research: A Handbook for Researching Online (New Technologies for Social Research series)
Internet Communication and Qualitative Research: A Handbook for Researching Online (New Technologies for Social Research series)
"The internet is exploding with possibilities for conducting social research. Mann and Stewart offer the first in-depth consideration of the prospects and potentials for doing qualitative research on-line. This wide ranging, clearly-written book is essential reading for researchers working at the cutting edge of qualitative methodology."...
Science Fact and Science Fiction: An Encyclopedia
Science Fact and Science Fiction: An Encyclopedia

Science fiction is a literary genre based on scientific speculation. Works of science fiction use the ideas and the vocabulary of all sciences to create valid narratives that explore the future effects of science on events and human beings. Science Fact and Science Fiction examines in one volume how science has propelled...

HTML and CSS Web Standards Solutions: A Web Standardistas' Approach
HTML and CSS Web Standards Solutions: A Web Standardistas' Approach

This book will teach you how to build hand-crafted web pages the Web Standardistas' way: using well-structured XHTML for content and CSS for presentation.

By embracing a web standards approach, you will hold the key to creating web sites that not only look great in all modern browsers, but also are accessible to a wide variety...

Pro Drupal 7 Development
Pro Drupal 7 Development

In its relatively short life, Drupal has had a tremendous impact on the landscape of the Internet. As a web content management system, Drupal has enabled the creation of feature- and content-rich web sites for organizations large and small. As a web application framework, Drupal is changing the way that people think about web application...

Smart Graphics: 11th International Symposium on Smart Graphics, Bremen, Germany, July 18-20, 2011
Smart Graphics: 11th International Symposium on Smart Graphics, Bremen, Germany, July 18-20, 2011

The International Symposium on Smart Graphics serves as a scientific forum that attracts researchers and practitioners from the fields of computer graphics, artificial intelligence, cognitive science, human–computer interaction, interface design, and information visualization. Initiated by Andreas Butz, Antonio Kr¨uger, and...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Information Retrieval: Searching in the 21st Century
Information Retrieval: Searching in the 21st Century

In the forty years since I started working in the field, and indeed for some years before that (almost since Calvin Mooers coined the term information storage and retrieval in the 1950s), there have been a significant number of books on information retrieval. Even if we ignore the more specialist research monographs and the...

Pro Windows 8 Development with HTML5 and JavaScript
Pro Windows 8 Development with HTML5 and JavaScript

Apps are at the heart of Windows 8, bringing rich and engaging experiences to both tablet and desktop users. Windows 8 uses the Windows Runtime (WinRT), a complete reimagining of Windows development that supports multiple programming languages and is built on HTML5, CSS and JavaScript. These applications are the future of Windows development...

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...

unlimited object storage image
Result Page: 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy