 |
|
 |  |  Mac OS X Panther in a NutshellAn instant success among newcomers, longtime Apple® fans and serious Unix® users alike, the Mac OS® X operating system combines stability, simplicity and elegance, and a stunning user interface. What more could Mac users want or need? The answer, of course, is Mac OS X Panther--a sleek and powerful overhaul of Mac OS X that promises to... |  |  Building a Web 2.0 Portal with ASP.NET 3.5If you think you're well versed in ASP.NET, think again. This exceptional guide gives you a master class in site building with ASP.NET 3.5 and other cutting-edge Microsoft technologies. You learn how to develop rock-solid web portal applications that can withstand millions of hits every day while surviving scalability and security pressures -- not... |
|
 Windows Vista Annoyances: Tips, Secrets, and HacksWindows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended.... |  |  Public Key Cryptography PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, ProceedingsThese are the Proceedings of the 11th International Workshop on Practice and Theory in Public Key Cryptography – PKC 2008. The workshop was held in Barcelona, Spain, March 9–12, 2008.
It was sponsored by the International Association for Cryptologic Research (IACR; see www.iacr.org), this year in cooperation with MAK, the... |  |  Mathematical Methods for Physics and Engineering: A Comprehensive GuideFrom reviews of previous editions: '...a great scientific textbook. It is a tour de force ... to write mathematical sections that are both complete and at an appropriate academic level. The authors have clearly succeeded in this challenge, making this a remarkable pedagogical book ... The choice of exercises is excellent and possibly the best... |
|
 Virtual Honeypots: From Botnet Tracking to Intrusion DetectionHoneypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and... |  |  |  |  Visual Basic .NET BibleIf Visual Basic .NET can do it, you can do it too … Visual Basic .NET represents the greatest generational leap Visual Basic has ever taken. Written by a talented team of Visual Basic .NET experts, this comprehensive guide helps you flatten the .NET learning curve and get to work, whether you're a Visual Basic 6 veteran, an ASP developer,... |
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |