Home | Amazing | Today | Tags | Publishers | Years | Search 
Java 2 Primer Plus
Java 2 Primer Plus

Java programming, like all computer programming, requires a dedication to learning and the right study tools. As a Java programmer, I have spent years reading various books on every aspect of Java and analyzing Sun's implementation of it to gain insight into its design philosophies. The Java programming books I have read vary in...

LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Cisco DQOS Exam Certification Guide (IP Telephony Self-Study)
Cisco DQOS Exam Certification Guide (IP Telephony Self-Study)

The official self-study test preparation guide for the Cisco DQOS 9E0-601 and QOS 642-641 exams

This official study guide helps you master all the topics on the DQOS exam, including:

  • QoS concepts, tools, and architectures
  • Classification and marking concepts and tools
  • Queuing in Cisco...
More Programming Pearls: Confessions of a Coder
More Programming Pearls: Confessions of a Coder
What do topics ranging from organic chemistry to Napoleon's campaigns have to do with computer programming? This collection of essays demonstrates the many varied aspects of programming, showing how programming can be both a fun and elegant science.

Some of the essays cover programming techniques, like how profilers can provide insight into the...

Digraphs: Theory, Algorithms and Applications
Digraphs: Theory, Algorithms and Applications
The study of directed graphs has developed enormously over recent decades, yet no book covers more than a tiny fraction of the results from more than 3000 research articles on the topic. Digraphs is the first book to present a unified and comprehensive survey of the subject. In addition to covering the theoretical aspects,...
Foundation Flash CS3 for Designers
Foundation Flash CS3 for Designers
Flash is one of the most engaging and innovative, and versatile technologies available—allowing the creation of pretty much anything from simple slideshows, animated banners and icons and cartoons, to Rich Internet Applications, Interactive videos, and dynamic user interfaces for web sites, kiosks, or DVDs. The possibilities are endless,...
Wikis For Dummies (Computer/Tech)
Wikis For Dummies (Computer/Tech)
Create content, link pages and webs, and grow your wiki

Set up your own wiki for personal or business use

So you want to wiki? This friendly guide gets you up and running in the wiki world in no time, from creating and editing wiki pages and going public to handling maintenance, promotion, and project management. You'll see how to...

Net-Centric Approaches to Intelligence and National Security (Kluwer International Series in Engineering and Computer Science)
Net-Centric Approaches to Intelligence and National Security (Kluwer International Series in Engineering and Computer Science)
This volume considers the web architectures and recent developments that make net-centric approaches for intelligence and national security possible. The development of net-centric approaches for intelligence, national and homeland security applications has become a major concern in many areas such as defense intelligence and national and...
Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect...
Hacking Windows Vista: ExtremeTech
Hacking Windows Vista: ExtremeTech

"Why didn't they ask me before they did that?"

Vista is the most radical revamping of Windows since 1995. But along with all the fantastic improvements, there are a couple of things that drive you up the wall. Maybe you're not seeing the performance you expect. Security is better, but boy, is it annoying. And what's with...

Professional Rootkits (Programmer to Programmer)
Professional Rootkits (Programmer to Programmer)

Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for...

Agents and Computational Autonomy: Potential, Risks, and Solutions (Lecture Notes in Computer Science)
Agents and Computational Autonomy: Potential, Risks, and Solutions (Lecture Notes in Computer Science)
This book originates from the First International Workshop on Computational Autonomy -Potential, Risks, Solutions, AUTONOMY 2003, held in Melbourne, Australia in July 2003 as part of AAMAS 2003. In addition to 7 revised selected workshop papers, the volume editors solicited 14 invited papers by leading researchers in the area.

The workshop...

Result Page: 824 823 822 821 820 819 818 817 816 815 814 813 812 811 810 809 808 807 806 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy