 |
|
 Cybercrime: A Reference Handbook (Contemporary World Issues)Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know. How can a person's identity be stolen? What exactly is a "hacker"? How much damage can a 17... |  |  Beginning Python: From Novice to Professional, Second EditionGain a fundamental understanding of Python’s syntax and features with the second edition of Beginning Python, an up–to–date introduction and practical reference. Covering a wide array of Python–related programming topics, including addressing language internals, database integration, network programming, and web... |  |  XML in Flash (Sams Other)XML in Flash is an excellent introduction to creating state-of-the-art Flash applications with XML. XML is quickly becoming the most popular way to store and manage data. Flash's XML Socket makes it possible to network Flash front-ends to an application server. This allows developers to use a Flash interface for applications such as message boards,... |
|
 Building Embedded Linux SystemsThere's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux. ... |  |  The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... |  |  Hacking Mac OS X Tiger : Serious Hacks, Mods and CustomizationsThis serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:
- Shows you how to speed it up, lock it down, or pull back the curtains.
- Dives into default system settings,...
|
|
 Hacking iPod and iTunes (ExtremeTech)How to Mod The Pod and fine-tune iTunes
Does your iPod go wherever you do? This book will take the two of you on your most exciting adventure–deep into iPod’s awesome potential. You already know it’s a musical prodigy, but wait 'til you teach your iPod to take notes, give you the weather and stock quotes, keep your... |  |  Maximum Windows 2000 Security (Maximum Security)Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.
Topics include:
Physical & File System Security,
Password Security,
Malicious Code,
Windows 2000 Network Security Architecture and Professional... |  |  The Zope Book (Landmark)The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope... |
|
|
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 |