 |
|
 Building a Cisco Wireless LANWireless LAN (Wi-Fi) technology is significantly more complex than cordless telephony; loss, coverage, and bandwidth requirements are much more stringent and the proliferation of wireless LANs in corporate environments has resulted in interesting security challenges. IEEE 802.11-based products offered by Cisco Systems have quickly become one of the... |  |  Managing Cisco Network SecurityInformation security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may... |  |  C#.net Web Developer's GuideThis volume teaches Web developers to build solutions for the Microsoft .NET platform. Web developers will learn to use C# components to build services and applications available across the Internet.
The focus of The C#.NET Web Developer’s Guide is on providing you with code examples that will help you leverage the... |
|
|
 The Shellcoder's Handbook: Discovering and Exploiting Security HolesUncover, exploit, and close security holes in any software or operating system
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This... |  |  Packet Filtering: Catching the Cool PacketsThis book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than... |  |  Programming Distributed Applications With Com & Microsoft Visual Basic 6.0Microsoft's DCOM is the key technology for enterprise development for the Windows platform. Written for the working Visual Basic developer or project manager, Programming Distributed Applications with COM and Microsoft Visual Basic 6.0 introduces the basics of DCOM objects in a clear style. All examples are written in Visual Basic, and the... |
|
 Lifehacker: 88 Tech Tricks to Turbocharge Your DayRedefine your personal productivity by tweaking, modding, mashing up, and repurposing Web apps, desktop software, and common everyday objects. The 88 "life hacks" -- clever shortcuts and lesser-known, faster ways to complete a task -- in this book are some of the best in Lifehacker.com's online archive. Every chapter describes an... |  |  Hacking the Cable Modem: What Cable Companies Don't Want You to KnowIn the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable... |  |  Hacking Digital Cameras (ExtremeTech)Why waste a thousand words?
Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole... |
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 |