 |
|
|
 Building Wireless Sensor Networks: with ZigBee, XBee, Arduino, and Processing
Get ready to create distributed sensor systems and intelligent interactive devices using the ZigBee wireless networking protocol and Series 2 XBee radios. By the time you're halfway through this fast-paced, hands-on guide, you'll have built a series of useful projects, including a complete ZigBee wireless network that... |  |  Protecting SQL Server Data
For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.
These... |  |  Cyber Terrorism: A Guide for Facility Managers
In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and... |
|
 Joomla! 1.5: Beginner's Guide
Joomla! is one of the most popular open-source Content Management Systems, actively developed and supported by a world-wide user community. Although it's a fun and feature-rich tool, it can be challenging to get beyond the basics and build a site that meets your needs perfectly. Using this book you can create dynamic, interactive web... |  |  Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... |  |  Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.
A comprehensive guide to Spring Security 3. You will learn... |
|
 Hacking For Dummies
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!
It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that... |  |  Hacking: The Next Generation (Animal Guide)With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the... |  |  Joomla! 1.5 Content AdministrationOften a company hires consultants or web developers to build a Joomla! web site, and then takes over running the site in house. If you are a content administrator concerned with creating and maintaining the 'product' of a content management site, and not modifying its code, this book is all you need.
This practical, hands-on guide will... |
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 |