Home | Amazing | Today | Tags | Publishers | Years | Search 
Brute Force: Cracking the Data Encryption Standard
Brute Force: Cracking the Data Encryption Standard
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved...
The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced...
Physical Database Design: the database professional's guide to exploiting indexes, views, storage, and more
Physical Database Design: the database professional's guide to exploiting indexes, views, storage, and more
Since the development of the relational model by E. F. Codd at IBM in 1970, relational databases have become the de facto standard for managing and querying structured data. The rise of the Internet, online transaction processing, online banking, and the ability to connect heterogeneous systems have all contributed to the massive growth in data...
Packet Broadband Network Handbook
Packet Broadband Network Handbook
BROADBAND DECISION SUPPORT

One thing at least is certain about tomorrow's global communications: broadband networks will be packetized. But how exactly will we get there from here? Before all the i's get dotted and t's crossed, leaders in telecom and networking have to make some hard choices. This is the book that can...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
Java All-In-One Desk Reference For Dummies (Computers)
Java All-In-One Desk Reference For Dummies (Computers)
9 books in 1—your key to success with Java!

Your one-stop guide to taming Java® and boosting your developer skills

Want to start programming with Java? This handy resource packs all the Java essentials you need into one easy-to-use guide. It's been fully updated for Java 6, covering...

Windows to Linux Migration Toolkit
Windows to Linux Migration Toolkit
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services...
A+, Network+, Security+ Exams in a Nutshell
A+, Network+, Security+ Exams in a Nutshell
A+, Network+, and Security+ certifications are recognized throughout the industry as the standard for proving foundation-level IT skill sets. A+, Network+ and Security+ Exams in a Nutshell provides exactly what experienced professionals need to pass one or all of these CompTIA certification exams. It's an all-in-one review resource that...
Model-Driven Testing: Using the UML Testing Profile
Model-Driven Testing: Using the UML Testing Profile
Model-driven development has become the most important new paradigm in software development and has already demonstrated considerable impact in reducing time to market and improving product quality. However, the development of high-quality systems not only requires systematic development processes but also systematic test processes.

This book...

SOA for the Business Developer: Concepts, BPEL, and SCA
SOA for the Business Developer: Concepts, BPEL, and SCA

Service-Oriented Architecture (SOA) is a way of organizing software. If your company’s development projects adhere to the principles of SOA, the outcome will be an inventory of modular units called "services," which allow for a quick response to change.

This book tells the SOA story in a simple, straightforward manner...

Pro LCS: Live Communications Server  Administration
Pro LCS: Live Communications Server Administration
Pro LCS: Live Communications Server Administration will guide you on how to best leverage Microsoft's Live Communications Server 2005 (LCS) to improve your business communications. This information-packed volume includes everything you need to know about LCS, but were afraid to ask. This includes all the different clients that you can...
Result Page: 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy