Home | Amazing | Today | Tags | Publishers | Years | Search 
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Beginning J2ME: From Novice to Professional, Third Edition
Beginning J2ME: From Novice to Professional, Third Edition

J2ME is a platform for wireless and mobile Java application development. Beginning J2ME makes this and all the fun you can have with it accessible to the first time wireless Java developer as well as useful to the experienced. This book includes coverage such as sound HTTPS support, lots of user interface API enhancements, a Game API,...

Pro Ajax and the .NET 2.0 Platform
Pro Ajax and the .NET 2.0 Platform

Pro Ajax and the .NET 2.0 Platform gets high marks from me because it is concise, informative and easy to follow. After reading the first three chapters I had a clear understanding of what Ajax really is.

...
Pro Wicket (Expert's Voice in Java)
Pro Wicket (Expert's Voice in Java)

I'm glad we're having our first real Wicket book available now...It is more than just a how-to guide; Karthik goes through the effort of explaining alternatives and explains how things are done by Wicket instead of merely giving you the steps...

Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Spring 2.5 Aspect Oriented Programming
Spring 2.5 Aspect Oriented Programming

Developing powerful web applications with clean, manageable code makes the maintenance process much easier. Aspect-Oriented Programming (AOP) is the easiest and quickest way to achieve such results. Spring is the only Java framework to offer AOP features. The combined power of Spring and AOP gives a powerful and flexible platform to develop and...

WebRTC Blueprints
WebRTC Blueprints

Develop your very own media applications and services using WebRTC

Overview

  • Create interactive web applications using WebRTC
  • Get introduced to advanced technologies such as WebSocket and Erlang
  • Develop your own secure web applications and services with practical projects
  • ...
Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Pro iOS Table Views: for iPhone, iPad, and iPod touch
Pro iOS Table Views: for iPhone, iPad, and iPod touch

If you’re an iOS app developer, chances are you’ll be using table views somewhere in your development projects. Table views are the bread and butter of iOS apps. With them, you can create everything from the simplest of lists to fully tricked-out user interfaces. Table views are one of the more complex components found in UIKit....

Evaluation of HSDPA and LTE: From Testbed Measurements to System Level Performance
Evaluation of HSDPA and LTE: From Testbed Measurements to System Level Performance

This book explains how the performance of modern cellular wireless networks can be evaluated by measurements and simulations

With the roll-out of LTE, high data throughput is promised to be available to cellular users. In case you have ever wondered how high this throughput really is, this book is the right read for you: At...

Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy