|
|
|
|
Access 2003 BibleWelcome to the Access 2003 Bible—your personal guide to a powerful, easyto- use database management system. This book is in its ninth revision and has been totally re-written for Microsoft Office Access 2003 with new text, new pictures, and a completely new and improved set of example files.
This book examines Access... | | Enterprise Security with EJB and CORBA(r)"Leveraging their strong implemention and standards committee experience, the authors have delivered the definitive guide to enterprise distributed object security."–Wing K. Lee, Sprint
Enterprise Security with EJB and CORBA
With e-business and distributed components comes the need for a bold new approach to... | | Introduction to Random Signals and NoiseRandom signals and noise are present in many engineering systems and networks. Signal processing techniques allow engineers to distinguish between useful signals in audio, video or communication equipment, and interference, which disturbs the desired signal.
With a strong mathematical grounding, this text... |
|
The Mac Hacker's HandbookAs more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat... | | | | |
|
|
|
|
Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 |