|
|
|
|
| | | | GFI Network Security and PCI Compliance Power ToolsUse GFI's Tools to Search for Vulnerabilities in Your Network!
For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.... |
|
|
Everything Changes: The Insider's Guide to Cancer in Your 20's and 30's"By page three of the introduction to Everything Changes, I wanted not only to devour the rest of the book, but I wanted to call Kairol up, get to know her, and (if we weren't both already married) see if I could sleep with her. Then the book got really good. It is, without doubt, the most forthright, emotionally sophisticated, and plain-old... | | | | Building Application Servers (SIGS: Advances in Object Technology)
You've read everything you can find about middleware, CORBA, transaction
monitors, message brokers, enterprise JavaBeans, and other distributed
technologies. Now it's time to put them to work. Time to build
your company's first multi-tiered application. But where do you start?
How do you structure the programs? How... |
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |