|
|
|
|
Windows Server 2003 Security CookbookIn the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know... | | Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... | | Next Generation Network Services: Technologies & Strategies'Next Generation' refers to the new technologies and services that telecommunications operators will have at their disposal as they create new 3G networks where voice and data converge and which are based on packet switched rather than circuit switched telephony.
Providing a much needed overview of the latest communication technologies... |
|
Core Java(TM), Volume I--Fundamentals (8th Edition)In late 1995, the Java programming language buret onto the Internet scene and gained instant celebrity status. The promise of Java technology was that it would become the universal glue that connects users with information, whether that information comes from web servers, databases, information providers, or any other imaginable source. Indeed,... | | Designing Cisco NetworksCisco authorized self-study book for CCDA foundation learning
* Prepare for CCDA certification while mastering the network design process * Learn to characterize existing networks and determine new customer requirements * Develop appropriate network topologies for various environments * Design device naming schemes and IP... | | CNET Do-It-Yourself Home Networking ProjectsYou may be thinking that home networking is so ubiquitous there could not possibly be anything new or different to do with this interconnected marvel of now everyday technology. You can surf the Web on any of two to three PCs, upload and download photos, fill an MP3 player to the brim, and chat with your friends and family via IM—what more... |
|
Network+ Study Guide (2nd Edition)Here's the book you need to prepare for CompTIA's updated Network+ exam, N10-003.
This revised edition of the best-selling Network+ Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the focused and accessible instructional approach that has... | | | | Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)Windows Embedded CE is a 32 - bit, native, hard, real - time, small - footprint operating system developed by Microsoft to address the needs of handheld, mobile, and embedded devices. With support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices like Smartphones, PocketPCs, set - top boxes, thin -... |
|
Windows Vista: The Definitive GuideWhether you're a beginner, power user, or seasoned professional, Windows Vista: The Definitive Guide has everything you need to customize the operating system, master your digital media, manage your data, and maintain your computer -- regardless of which Windows Vista edition you're using.
Why this book and not some other resource?... | | | | Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first... |
|
|
Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 |