Home | Amazing | Today | Tags | Publishers | Years | Search 
IPv6 Essentials
IPv6 Essentials
IPv6, the next generation Internet Protocol, has been in the works since the early 90s when the rapid growth of the Internet threatened to exhaust existing IP addresses. Drawing on 20 years--operational experience with the existing protocol (IPv4), the new protocol offers scalability, increased security features, real-time traffic support, and...
Learning Unix for Mac OS X Panther
Learning Unix for Mac OS X Panther
This compact book provides a user-friendly tour for the uninitiated of the Mac Unix base. You can safely explore Terminal and familiarize yourself with the command line, learning as you go about the hundreds of Unix programs that come with your Mac. You'll begin to understand the power and flexibility of Unix. And if Unix isn't new to you, you'll...
Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

3D Game Engine Architecture: Engineering Real-Time Applications with Wild Magic
3D Game Engine Architecture: Engineering Real-Time Applications with Wild Magic
Dave Eberly's 3D Game Engine Design was the first professional guide to the essential concepts and algorithms of real-time 3D engines and quickly became a classic of game development. Dave's new book 3D Game Engine Architecture continues the tradition with a comprehensive look at the software engineering and...
Network Security Hacks: Tips & Tools for Protecting Your Privacy
Network Security Hacks: Tips & Tools for Protecting Your Privacy

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

TCP/IP Unleashed (3rd Edition)
TCP/IP Unleashed (3rd Edition)

TCP/IP Unleashed, Third Edition, explains the features and complexities of the TCP/IP protocol suite in a comprehensive, logical format. The book is designed for easy reference and incorporates step-by-step guidelines and configuration examples to enhance the reader's learning experience. Our expert authors walk through the fundamentals of...

Borland C++Builder 6 Developer's Guide
Borland C++Builder 6 Developer's Guide

C++Builder 6 Developer's Guide is revised for the latest version of C++Builder, the biggest update to C++Builder in years. C++Builder is an ANSI C++ IDE. The Version 6 adds BizSnap, a tool to build Web Services using XML/SOAP, .NET, and BizTalk from Microsoft, and SunONE from Sun Microsystems. Other new components include WebSnap for...

Eclipse for Dummies
Eclipse for Dummies
That’s what New York City Mayor Fiorello LaGuardia said back in 1934. Not
many people understood the meaning or the impact of Mayor LaGuardia’s
statement, because he said it in Latin. (“E finita la cuccagna,” said the mayor.)
But today, most people agree with the spirit of LaGuardia’s proclamation....
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications

Proven techniques and patterns for enterprise development.

  • Design guidelines for EJB 2.0 component architecture
  • Powerful patterns for enterprise application design
  • Extensive real-world code examples
  • Covers every type of component, including message-driven beans

This...

MCITP Self-Paced Training Kit (Exam 70-444): Optimizing and Maintaining a Database Administration Solution Using Microsoft  SQL Server(TM) 2005
MCITP Self-Paced Training Kit (Exam 70-444): Optimizing and Maintaining a Database Administration Solution Using Microsoft SQL Server(TM) 2005
Key Book Benefits:

- Comprehensive study guide written by exam-certified authors - Deeper, more focused coverage of exam objectives and sub-objectives-plus instructive case studies and troubleshooting scenarios to enhance your performance on the job - 425 practice questions on CD - Test engine that enables customized testing, pre-assessment and...

Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy