|
|
|
|
|
How to Cheat at Securing a Wireless NetworkWireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
- Denial of service (DoS) and other network layer attacks
- Unauthorized
... | | Microsoft .NET for ProgrammersShows intermediate and advanced programmers how to deploy a single .NET application with multiple interfaces so that it can be accessed from the command line, through a Windows GUI, by means of a Web browser, or using a mobile device.
The purpose of this book is to explore the many parts that make up .NET, to assemble them into a... | | GIS For Dummies (Computer/Tech)GIS (geographic information system) is a totally cool technology that has been called “geography on steroids.” GIS is what lets you see the schools in your neighborhood or tells you where the nearest McDonald’s is. GIS For Dummies tells you all about mapping terminology and digital mapping, how to locate geographic... |
|
Microsoft Dynamics NAV 2009 Programming Cookbook
Microsoft Dynamics NAV 2009 is a business management solution that helps simplify and streamline highly specialized business processes such as finance, manufacturing, customer relationship management, supply chains, analytics, and electronic commerce for small and medium-sized enterprises. ERP systems like NAV thus become the center of a... | | Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development
With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable
thing — adapt their existing Cocoa computer application programming
framework to make applications for a touch-based device with limited memory and
speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in fact,
turned... | | |
|
|
|
Result Page: 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 |