|
|
|
|
Electrical Circuit Theory and Technology, Second Edition: Revised edition
Electrical Circuit Theory and Technology is a fully comprehensive text for courses in electrical and electronic principles, circuit theory and electrical technology. The coverage takes students from the fundamentals of the subject, to the completion of a first year degree level course. Thus, this book is ideal for students studying... | | FreeBSD Corporate Networker's Guide (With CD-ROM)"FreeBSD has been the secret weapon of serious network administrators for many years now and this book should provide a welcome introduction to those who have yet to discover it for themselves." --Jordan Hubbard, Co-founder, The FreeBSD Project
FreeBSD is the engine that runs on some... | | GlassFish Security
Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.
Learn to secure Java EE... |
|
|
Social Engineering: The Art of Human Hacking
The first book to reveal and dissect the technical aspect of many social engineering maneuvers
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the... | | Sas 9.2 Output Delivery System User's GuideNew and enhanced features in the Output Delivery System (ODS) provide an almost limitless number of choices for reporting and displaying analytical results with a greater variety of formatting selections and output destinations.
With ODS statements, you can use new ODS packages, measured RTF output, and enhanced inline formatting,... | | Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most
notably in communications between users, servers, and devices. Unfortunately,
this has led to many security challenges and problems. Recent examples include
password leakage on large social network sites and defacement of websites. It is,
therefore,... |
|
Hacking Exposed: Network Security Secrets & Solutions, Third Edition"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool
"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."... | | Adobe Dreamweaver CS5 with PHP: Training from the Source
My first encounter with PHP came about 10 years ago. By that time, I already had plenty of
experience developing websites. I had started out writing HTML in a text editor before settling
on Dreamweaver as my favorite authoring tool. A new project involved publishing more than
30 articles a day. It was a subscription service, so the... | | Building Internet Firewalls
More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images.Everyone is jumping on the Internet bandwagon. Once a... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |