Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Fast Track Visual Basic .NET
Fast Track Visual Basic .NET
Aimed at the Visual Basic 6 programmer turning to .NET for the first time, Fast Track Visual Basic .NET provides a worthy, fast-paced introduction to the features and APIs working developers need to get started with VB .NET. The salient feature of this book is its compact size and fast-moving yet approachable tutorial to the new version...
MySpace Unraveled: What it is and how to use it safely
MySpace Unraveled: What it is and how to use it safely
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech...
Combating Piracy: Intellectual Property Theft and Fraud
Combating Piracy: Intellectual Property Theft and Fraud
Manifestations of fraud in the early twenty-first century are showing signs of innovations and adaptation in response to shifting opportunities. This book reports on new analyses of intellectual property theft as its most recent expression. Fraud and piracy of products and ideas have become common as the opportunities to commit them expand, and...
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern recognition, and related areas. It covers a representative set of novel graph-theoretic methods for complex computer vision and pattern recognition tasks. The first part of the book presents the application of graph theory to...
Mathematical Methods for Physics and Engineering: A Comprehensive Guide
Mathematical Methods for Physics and Engineering: A Comprehensive Guide
From reviews of previous editions: '...a great scientific textbook. It is a tour de force ... to write mathematical sections that are both complete and at an appropriate academic level. The authors have clearly succeeded in this challenge, making this a remarkable pedagogical book ... The choice of exercises is excellent and possibly the best...
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
Large volumes of video content can only be easily accessed by the use of rapid browsing and retrieval techniques. Constructing a video table of contents (ToC) and video highlights to enable end users to sift through all this data and find what they want, when they want are essential. This reference puts forth a unified framework to integrate these...
JSP: Practical Guide for Programmers
JSP: Practical Guide for Programmers
It has been more than 10 years since the introduction of the Mosaic Web browser from NCSA when the Web first achieved widespread notice. Early Web pages were generally simple, as people slowly learned the new Hypertext Markup Language (HTML) concepts. As the Internet-browser wars heated up, more people entered the fray, and different technologies,...
Joomla! 1.5 SEO
Joomla! 1.5 SEO
Some sites always appear at the top of a search result while others fail to even make it to the top ten. Wouldn't you want to see your site on the first page of any search result? This is not easily feasible if you are depending solely on the marketing guys whom you hire for SEO.

Joomla! SEO will help you to attract more visitors and
...
Mining, Society, and a Sustainable World
Mining, Society, and a Sustainable World

This is the first book of peer-reviewed, edited papers that examines the broad subject of the minerals industry in relation to sustainable development. The book takes a proactive, positivist, and solution-oriented approach, while not shying away from identifying the real problems that mining raises in respect to social and economic development,...

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

unlimited object storage image
Result Page: 821 820 819 818 817 816 815 814 813 812 811 810 809 808 807 806 805 804 803 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy