Home | Amazing | Today | Tags | Publishers | Years | Search 
E-Commerce: A Control and Security Guide
E-Commerce: A Control and Security Guide

Once scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and...

Online! The Book
Online! The Book
Are you getting the best of the Internet? No way! The Web's packed with great sites you haven't discovered. Great tools you haven't tried. Great stuff you haven't done.

But that's about to change!

You're looking at an amazing collection of today's coolest Web stuff. Hundreds of incredible ideas, tips, techniques, and sites...all...

iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the expressed purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the...
Geekonomics: The Real Cost of Insecure Software
Geekonomics: The Real Cost of Insecure Software
You may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The...
Creating Mac Widgets with Dashcode (Firstpress)
Creating Mac Widgets with Dashcode (Firstpress)
In 100 pages, you will learn to create and use widgets using Dashcode. Widgets are simple, typically small applications for a specific purpose, such as a weather report, a calculator, a stock quote, and the like that reside on the Mac Dashboard. Building these before Dashcode was time consuming though not hard; but now, you can whip up a widget...
Mastering Network Security
Mastering Network Security
Do you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or...
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Windows 2000 Security (Networking)
Windows 2000 Security (Networking)
Due to the necessity of instant communication and data transfer in today's business world, a secure computer network is critical. Security is not just your company's firewall. A more detailed strategy is needed to ward off threats from viruses, hackers, and unauthorized users. Microsoft Windows 2000 Security is your complete guide to system and...
Netcat Power Tools
Netcat Power Tools
The only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable
...
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

Learning Perl, 5th Edition
Learning Perl, 5th Edition
Learning Perl is designed for those who seek a rapid working knowledge of Perl. A public domain language, Perl has established itself as the premier UNIX scripting language--replacing facilities such as the shell, sed and awk. It is currently taking root in non-UNIX markets as well. Perl is a high-level, multi-purpose language. It is used in...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy