|
|
|
|
|
Linux in the WorkplaceThe Sacramento Bee "If you've got a Linux computer you'd like to use, this will show you how to get the job done."
Slashdot "A useful and freindly KDE-centric introduction to Linux for nongeeks."
... | | | | |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through... | | Data Mining: Practical Machine Learning Tools and Techniques, Second EditionThis book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,... | | Gray Hat Hacking, Second EditionUncover, plug, and ethically disclose security flaws
Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out... |
|
Encyclopedia of Data Warehousing and MiningHow can a data-flooded manager get out of the “mire”? How can a confused decision maker pass through a “maze”? How can an over-burdened problem solver clean up a “mess”? How can an exhausted scientist decipher a “myth”? The answer is an interdisciplinary subject and a powerful tool known as... | | Digital Video and DSP: Instant AccessAlthough there are many variations and implementation techniques, video signals are just a way of transferring visual information from one point to another. The information may be from a VCR, DVD player, a channel on the local broadcast, cable television, or satellite system, the Internet, cell phone, MP3 player, or one of many other sources.... | | The Best Damn Cybercrime and Forensics Book PeriodAs is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.
If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the... |
|
|
Result Page: 7 6 5 4 3 2 1 |