Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Active Java: Object-Oriented Programming for the World Wide Web
Active Java: Object-Oriented Programming for the World Wide Web
The past four years have seen a phenomenal rise in interest in the Internet. Tens of millions of users regularly access this network to carry out operations such as browsing through electronic newspapers, downloading bibliographies, participating in news groups and emailing friends and colleagues. The number of applications that are hosted within...
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Teach Yourself VISUALLY Windows 8.1
Teach Yourself VISUALLY Windows 8.1

A practical guide for visual learners eager to get started with Windows 8.1

If you learn more quickly when you can see how things are done, this Visual guide is the easiest way to get up and running on Windows 8.1. It covers more than 150 essential Windows tasks, using full-color screen shots and step-by-step instructions to...

Beginning ASP.NET 2.0 in VB 2005: From Novice to Professional
Beginning ASP.NET 2.0 in VB 2005: From Novice to Professional

The most up-to-date and comprehensive introductory ASP.NET book you'll find on any shelf, Beginning ASP.NET 2.0 in VB 2005 guides you through Microsoft's latest technology for building dynamic websites. You'll learn to build dynamic web pages quickly, with only basic prior knowledge of Visual Basic. Included is thorough coverage of...

Red Hat Linux Security and Optimization
Red Hat Linux Security and Optimization
Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Networking (2nd Edition) (Networking Technology)
Networking (2nd Edition) (Networking Technology)

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical...

Active Directory Cookbook, 3rd Edition
Active Directory Cookbook, 3rd Edition
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet Agents with PHP/CURL
Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet Agents with PHP/CURL

The Internet is bigger and better than what a mere browser allows. Webbots, Spiders, and Screen Scrapers is for programmers and businesspeople who want to take full advantage of the vast resources available on the Web. There's no reason to let browsers limit your online...

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy