 |
|
 grep Pocket Referencegrep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket... |  |  Cable Communications TechnologyCable is now as much in the broadband business as it is television. This book explains the fundamentals of coaxial cable technology and the DSP that controls it, along with the cable modem and voice over IP technology now drastically changing the cable operators’ business. Aimed at working engineers and technicians, it can also be used a... |  |  Encyclopedia Of Haunted Places: Ghostly Locales From Around The WorldThe Encyclopedia of Haunted Places is the first directory to be written by dozens of the world's leading paranormal investigators. Research notes, location background, first-hand accounts, and many anomalous photographs featuring ghostly manifestations comprise the hundreds of haunted listings in this directory. For years, paranormal investigative... |
|
 |  |  Big JavaNo one brews up a better Java guide than Cay Horstmann and in this Third Edition of Big Java he's perfected his recipe. Thoroughly updated to include Java 6, the Third Edition of Horstmann's bestselling text helps you absorb computing concepts and programming principles, develop strong problem-solving skills, and become a better programmer, all... |  |  Algorithm DesignAlgorithm Design introduces algorithms by looking at the real-world problems that motivate them. The book teaches a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the... |
|
 |  |  Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... |  |  Blown to Bits: Your Life, Liberty, and Happiness After the Digital ExplosionEvery day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,... |
|
 Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
... |  |  Introductory Nuclear PhysicsIn the half dozen years or so since the first publication of Introductory Nuclear Physics, there have been several new developments and changes in the emphasis in the field. This, together with the enthusiastic feedback from colleagues and students, makes it imperative to publish a new edition.
For an active topic of research, a textbook... |  |  Silverlight 2 UnleashedFull Color Code samples appear as they do in Visual Studio and Expression Blend!
Printed entirely in color, with helpful figures and syntax coloring to make code samples appear as they do in Visual Studio and Expression Blend!
... |
|
| Result Page: 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 |