|
|
| | | | Wireless Hacks : 100 Industrial-Strength Tips & ToolsWritten for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field"... |
|
The Definitive Guide to Apache mod_rewritemod_rewrite, frequently called the “Swiss Army Knife” of URL manipulation, is one of the most popular—and least understood—modules in the Apache Web Server’s bag of tricks. In this chapter we’ll discuss what it is, why it’s necessary, and the basics of using it. For many people, mod_rewrite... | | Encyclopedia of Folk HeroesSeal (of the Curtin University of Technology in Perth, Australia) has put together an interesting if sporadic collection of folk heroes. He refers to it as a "representative collection of legendary, historical, and magical heroes from many of the world's extensive folklores." South and Central America receive very little coverage.... | | Making IT Governance Work in a Sarbanes-Oxley WorldIt may not be readily apparent, but IT is undergoing what may be its most significant revolution ever—a revolution driven by rapidly emerging new business models, the power of the customer, global operations, and radical new technologies at the edge of the Net. And this revolution is having as much impact on how technology... |
|
Cyber Adversary Characterization: Auditing the Hacker MindA book about hacking is a book about everything. First, the meaning of hacker.
The word “hacker” emerged in an engineering context and became popular at The Massachusetts Institute of Technology (MIT), among other places, as a way to talk about any ingenious, creative, or unconventional use of a machine ... | | Encyclopaedia Arcane: Battle Magic - The Eldritch StormEncyclopaedia Arcane: Battle Magic Continuing the Encyclopaedia Arcane series. Battle Magic introduces the greatest force of sorcery into the d20 System. Battle Mages of incredible power are able to blast entire hordes of enemies apart with fire and lightning - now, for the very first time, players too can access this awesome destructive force.... | | Runic Amulets and Magic Objects
The runic alphabet, in use for well over a thousand years, was employed by various Germanic groups in a variety of ways, including, inevitably, for superstitious and magical rites. Formulaic runic words were inscribed onto small items that could be carried for good luck; runic charms were carved on metal or wooden amulets to ensure peace or... |
|
Securing & Optimizing Linux: A Hands on Guide for Linux ProfessionalsThis book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and... | | Circuit-Bending: Build Your Own Alien Instruments (ExtremeTech)Fans will get bent out of shape if they miss the first book to cover circuit-bending-""bending,"" for short-the method by which an electronic toy or a device such as a keyboard is short-circuited and modified to create an entirely different sound Written by the inventor of the technology, this book covers the tools of the... | | Statistics in a Nutshell: A Desktop Quick ReferenceOne thing I (Sarah) have learned over the last 20 or so years is that a sure way to derail a promising conversation at a party is to tell people what I do for a living. And rest assured that I’m neither a tax auditor nor captain of a sludge barge.No, I’m merely a biostatistician and statistics instructor, a revelation which invariably... |
|
Result Page: 5 4 3 2 1 |