Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers (The Practical Guides)
Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers (The Practical Guides)
A fresh look at PHP as it applies to multi-tier application design, giving developers an alternative to more expensive and less manageable solutions.

Some of the benefits of using PHP is that it is easier to learn and cheaper than using Java J2EE Enterprise or .NET platforms. In concert with a database server and a
...
MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a MS Windows Server 2003 AD Infrastructure, Second Edition
MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a MS Windows Server 2003 AD Infrastructure, Second Edition
Get in-depth exam preparation for the updated Exam 70-294, a core MCSA/MCSE exam for Windows Server 2003-and build real-world job skills. Includes case studies, troubleshooting labs, and more.

Active Directory directory service provides a single point of network resource management, allowing you to add, remove, and relocate users and
...
Foundation Flash CS3 Video
Foundation Flash CS3 Video

Video is one of the most exciting features on today's Internet, with widespread adoption being made possible by advances in bandwidth and software. But simply streaming video clips to Web users is only the tip of the iceberg! Flash CS3 offers a whole host of advanced video features, allowing you to create breathtaking user...

SIP Security
SIP Security
This book gives a detailed overview of SIP specific security issues and how to solve them

While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms...

Vulnerability Management
Vulnerability Management

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any...

The Routledge Handbook of Feminist Economics (Routledge International Handbooks)
The Routledge Handbook of Feminist Economics (Routledge International Handbooks)
We are delighted to have finalized the Handbook of Feminist Economics project we began in summer 2018. We set off with the goal of taking stock of the accumulated wisdom on feminist economics from the social provisioning perspective to feminist economics, delineated by Marilyn Power in 2004. Power’s short piece inductively...
Network Security Bible
Network Security Bible
If you need a solid foundation in network security, this is it

Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how
...
Digital Data Integrity: The Evolution from Passive Protection to Active Management
Digital Data Integrity: The Evolution from Passive Protection to Active Management
How to plan your future strategy for efficient, cost-saving data management

Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
The CBI Skills and Training Handbook
The CBI Skills and Training Handbook

I am very happy once again to contribute this Foreword to The Corporate Finance Handbook. The Bank of England continues to take a close interest in the availability of finance to firms of all sizes and this falls squarely within one of the Bank’s three core purposes – that of seeking to ensure the effectiveness of financial services...

Instant Burp Suite Starter
Instant Burp Suite Starter

Get up and running with Burp Suite using this hands-on practical guide

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  •  
  • Intercept HTTP/S requests with Burp Proxy.
  • Tamper and analyze responses.
  • ...
Windows Vista Security: Securing Vista Against Malicious Attacks
Windows Vista Security: Securing Vista Against Malicious Attacks

It's not the computer. The hacker's first target is YOU!

A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy