 |
|
 Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Software Engineering: A Practitioner's Approach
When computer software succeeds—when it meets the needs of the people who use
it, when it performs flawlessly over a long period of time, when it is easy to modify
and even easier to use—it can and does change things for the better. But when software
fails—when its users are dissatisfied, when it is error prone, when... |  |  Database Processing (12th Edition)
The 12th edition of Database Processing: Fundamentals, Design, and Implementation refines
the organization and content of this classic textbook to reflect a new teaching and professional
workplace environment. Students and other readers of this book will benefit from new
content and features in this edition.
... |
|
|
|
 Alfresco 3 Records Management
This book is structured in a sequential way that walks you through the steps necessary to set up your Alfresco Records Management system. Chapters follow a logical progression with each chapter building on the knowledge and implementation details learned in earlier chapters. If you are a records manager, business analyst, or a software... |  |  C: A Reference Manual (5th Edition)
This text is a reference manual for the C programming language. OUf aim is to provide a complete and precise discussion of the language, the run-time libraries. and a style of C programming that emphasizes correctness, portability, and maintainability.
We expect our readers to already understand basic programming concepts, and many... |  |  Programming Language Pragmatics, Third Edition
A course in computer programming provides the typical student's first exposure to the field of computer science. Most students in such a course will have used computers all their lives, for email, games, web browsing, word processing, social networking, and a host of other tasks, but it is not until they write their first programs that... |
|
Result Page: 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 |