 |
|
 Out of the Inner Circle: A Hacker's Guide to Computer Security
This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system.... |  |  E-Mail Security: A Pocket Guide
E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,... |  |  Murach's C# 2010
This is the 2010 edition of Murach's best-selling C# book on developing Windows Forms applications. Here's what developers have said about earlier editions:
"I have to tell you that your C# book is far and away the best resource I have seen to date. It really does do what the learner needs. It is simple,... |
|
|
|
|
Result Page: 765 764 763 762 761 760 759 758 757 756 755 754 753 752 751 750 749 748 747 |