 |
|
|
 Geekonomics: The Real Cost of Insecure SoftwareYou may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The... |  |  Creating Mac Widgets with Dashcode (Firstpress)In 100 pages, you will learn to create and use widgets using Dashcode. Widgets are simple, typically small applications for a specific purpose, such as a weather report, a calculator, a stock quote, and the like that reside on the Mac Dashboard. Building these before Dashcode was time consuming though not hard; but now, you can whip up a widget... |  |  Mastering Network SecurityDo you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or... |
|
 |  |  Windows 2000 Security (Networking)Due to the necessity of instant communication and data transfer in today's business world, a secure computer network is critical. Security is not just your company's firewall. A more detailed strategy is needed to ward off threats from viruses, hackers, and unauthorized users. Microsoft Windows 2000 Security is your complete guide to system and... |  |  Netcat Power ToolsThe only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.
Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable... |
|
 |  |  Learning Perl, 5th EditionLearning Perl is designed for those who seek a rapid working knowledge of Perl. A public domain language, Perl has established itself as the premier UNIX scripting language--replacing facilities such as the shell, sed and awk. It is currently taking root in non-UNIX markets as well. Perl is a high-level, multi-purpose language. It is used in... |  |  Physical Security for IT"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each... |
|
| Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |