 |
|
|
|
|
 Designing InteractionsDigital technology has changed the way we interact with everything from the games we play to the tools we use at work. Designers of digital technology products no longer regard their job as designing a physical objectвДbeautiful or utilitarianвДbut as designing our interactions with it. In Designing Interactions,... |  |  Koi For DummiesWelcome to Koi For Dummies, a book designed for two purposes — to tell you about the beautiful fish known as koi and to make koi-keeping so simple you’ll wonder why you didn’t pick up this hobby eons ago.
What’s so much fun about koi? They’re gorgeous fish, and they’ve been selectively bred for more... |  |  Fuzzing: Brute Force Vulnerability DiscoveryThe concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered... |
|
|
 Cryptology UnlockedCryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.
This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic... |  |  Hunting Security BugsYour essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before... |  |  Professional Ajax (Programmer to Programmer)Combining tried-and-true CSS, XML, and JavaScript™ technologies, Ajax provides web developers with the ability to create more sophisticated and responsive user interfaces and break free from the "click-and-wait" standard that has dominated the web since its introduction.
This book discusses the range of request brokers... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |