A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure
Key Features
Advanced exploitation techniques to breach modern operating systems and complex network devices
In any software development project, many developers contribute changes over a period of time. Using a version control system to track and manage these changes is vital to the continued success of the project. This book introduces you to Subversion, a free, open-source version control system, which is both more powerful and much less complex...
The AIX and RS/6000 certifications offered through the Professional Certification Program from IBM are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of AIX and RS/6000. A complete set of professional certifications are available. They include:
Optical communications technology is growing increasingly in importance, with a rapid pace of development. Innovative optical devices have emerged from the integration of semiconductor laser diodes, amplifiers and filters with optical waveguide technology. This well-researched volume traces the evolution of semiconductor laser amplifiers...
Flex 3 is a great technology for developing Rich Internet Applications for the Web as well as for the desktop. If you are a developer looking to design great-looking and sophisticated user interfaces that resemble desktop-based applications, and want to utilize an existing server technology such as Java to develop RIAs, this book is for you.
"As a forward-thinking entrepreneur, it's clear to me that Twitter is a must-use for any smart businessperson online. Joel Comm's Twitter Power is the must-read guide defining how to leverage the power of this incredible tool to brand and increase sales in an increasingly competitive...
This comprehensive handbook, written by leading experts in the field, details the groundbreaking research conducted under the breakthrough GALE program--The Global Autonomous Language Exploitation within the Defense Advanced Research Projects Agency (DARPA), while placing it in the context of previous research in the fields of natural...
Database Systems: The Complete Book is ideal for Database Systems and Database Design and Application courses offered at the junior, senior and graduate levels in Computer Science departments. A basic understanding of algebraic expressions and laws, logic, basic data structure, OOP concepts, and programming environments is implied. ...
Business Calculus Demystified clarifies the concepts and processes of calculus and demonstrates their applications to the workplace. Best-selling math author Rhonda Huettenmueller uses the same combination of winning step-by-step teaching techniques and real-world business and...
The world of medicine has become splintered into two factions, that of orthodoxy and its counterpart, alternative or complementary medicine. A problem with alternative medicine is, of course, that of anecdote and hearsay. The solution: the disclosure, in an unassailable fashion, of the underlying biochemical principles for alternative cancer...
BDD in Action teaches you the Behavior-Driven Development model and shows you how to integrate it into your existing development process. First you'll learn how to apply BDD to requirements analysis to define features that focus your development efforts on underlying business goals. Then,...