Home | Amazing | Today | Tags | Publishers | Years | Search 
Make Projects: Small Form Factor PCs
Make Projects: Small Form Factor PCs
Shoebox sized and smaller, small form factor PCs can pack as much computing muscle as anything from a PDA to a full-sized desktop computer. They consume less power, have few or no moving parts, and are very quiet. Whether you plan to use one as a standalone PC or want to embed it in your next hacking project, a small form factor PC may be the next...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
The Rails Way (Addison-Wesley Professional Ruby Series)
The Rails Way (Addison-Wesley Professional Ruby Series)
The expert guide to building Ruby on Rails applications

 

Ruby on Rails strips complexity from the development process, enabling professional developers to focus on what matters most: delivering business value. Now, for the first time, there’s a comprehensive,...

Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended....
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling

"Ron Goldman is a leading expert who knows the fundamental concepts and their interconnectedness, as well as the small details. The elegance of the writing and of the methods used to present the material allows us to get a deep understanding of the central concepts of CAGD. In its simplicity and pure beauty, the theory indeed resembles the...

Practical DWR 2 Projects (Expert's Voice in Java)
Practical DWR 2 Projects (Expert's Voice in Java)

The Ajax craze is sweeping the world, and there is no shortage of libraries from which to choose to make it all easier to develop. One of those libraries has risen near the top in the Java space, and that library is DWR. DWR, or Direct Web Remoting, allows you to treat your Java classes running on the server as if they were local objects running...

Dojo: The Definitive Guide
Dojo: The Definitive Guide
Of all the Ajax-specific frameworks that have popped up in recent years, one clearly stands out as the industrial strength solution. Dojo is not just another JavaScript toolkit -- it's the JavaScript toolkit -- and Dojo: The Definitive Guide demonstrates how to tame Dojo's extensive library of utilities so that you can build rich and responsive web...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Result Page: 33 32 31 30 29 28 27 26 25 24 23 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy