Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
Microsoft Exchange Server Survival Guide (Version 4.0.)
Microsoft Exchange Server Survival Guide (Version 4.0.)
Microsoft Exchange Server is quickly becoming a popular product in Microsoft's BackOffice suite. As the weeks go by
since its April, 1996 introduction, the momentum behind Exchange Server continues to build. In its first version,
Exchange Server 4.0 is a powerful, feature-rich product that is finding its rightful place in the hands of the
...
Modern Robotics: Building Versatile Machines (Milestones in Discovery and Invention)
Modern Robotics: Building Versatile Machines (Milestones in Discovery and Invention)

The Milestones in Science and Discovery set is based on a simple but powerful idea—that science and technology are not separate from people’s daily lives. Rather, they are part of seeking to understand and reshape the world, an activity that virtually defines being human.

More than a million years ago, the ancestors of...

Mac OS X: The Missing Manual, Panther Edition
Mac OS X: The Missing Manual, Panther Edition
Apple says that Mac OS X 10.3 introduces 150 new features--but that's not really true. In fact, "Panther" includes many more than that. It's faster, more polished, and much more efficient. But it still comes without a manual. With 300,000 copies in print, the first two versions of this book became industry bestsellers. Now David...
Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Proven guerrilla marketing tactics specifically designed for consultants

Jay Conrad Levinson’s Guerrilla Marketing revolutionized the way marketers do business by defying the conventional wisdom that effective marketing means spending big bucks. He devised highly successful marketing strategies that rely on creativity, imagination, and...

What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
The war in Iraq is not only controversial, it's also astronomically expensive. Now Rob Simpson answers the question many concerned Americans have been asking: Wasn't there some other way the government could have spent one trillion of our tax dollars?

What We Could Have Done with the Money presents 50 thought-provoking spending...

Dr.Riemann's Zeros
Dr.Riemann's Zeros

In 1859 Bernhard Riemann, a shy German mathematician, wrote an eight-page article, suggesting an answer to a problem that had long puzzled mathematicians. For the next 150 years, the world's mathematicians have longed to confirm the Riemann hypothesis. So great is the interest in its solution that in 2001, an American foundation offered a...

Java™ for Programmers (2nd Edition) (Deitel Developer Series)
Java™ for Programmers (2nd Edition) (Deitel Developer Series)

Welcome to Java—the world’s most widely used computer programming language. In this book, you’ll learn object-oriented programming—today’s key programming methodology.

You’ll create and work with many software objects in this text.

Java is the preferred language for meeting many...

The Last Job:
The Last Job:

“[Bilefsky] is a brisk, enthusiastic storyteller.… [A] meticulously researched procedural.” ?Laura Lippman, New York Times

Over Easter weekend 2015, a motley crew of six aging English thieves couldn’t resist coming out of retirement for one last career-topping heist....

Visual Basic .NET Primer Plus
Visual Basic .NET Primer Plus

Visual Basic is the most popular programming language in existence. At the present time, it is estimated that there are over three million programmers using Visual Basic. It is also the most popular introductory programming language at most colleges and universities. This is going to become even more widespread with Visual Basic .NET. From...

Optimizing Wireless/RF Circuits
Optimizing Wireless/RF Circuits

Select and optimize wireless/RF circuits.

Get last-word guidelines for selecting and optimizing wireless/RF ICs with John D. Lenk's Optimizing Wireless/RF Circuits. As you'd expect from an author whose electronics guidebooks have sold over 2 million copies worldwide, instead of complex math and abstract theory this hands-on...

Radiation Dose from Adult and Pediatric Multidetector Computed Tomography (Medical Radiology / Diagnostic Imaging)
Radiation Dose from Adult and Pediatric Multidetector Computed Tomography (Medical Radiology / Diagnostic Imaging)
The use of computed tomography (CT) has seen enormous growth over the past decade. In the US, approximately 63 million examinations were performed in 2005 (Niagara Health Quality Coalition 2004) compared to 35 million in 2000. The increased number of clinical applications (e.g., in emergency and trauma, paediatric, cardiac, and...
unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy