|
|
Covert Java: Techniques for Decompiling, Patching, and Reverse EngineeringAs a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling,... | | Microsoft Windows Small Business Server 2003 R2 Administrator's CompanionGet comprehensive information to deploy, manage, and troubleshoot Microsoft Windows Small Business Server 2003 R2 for messaging and collaboration, Internet access, database storage, printing, faxing, support for line-of-business applications, and end-to-end network administration.
The first time you noticed Microsoft... | | |
|
|
|
Secure Coding: Principles and PracticesDespite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &... | | Windows Server HacksThe tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT,... | | Windows Server 2003/2000 Thin Client SolutionsThis book brings together all the insights, knowledge, and step-by-step guidance you need to deliver robust, scalable, and stable server-based computing solutions with Microsoft Windows Terminal Services and Citrix MetaFrame Presentation Server 3.0. Building on two best-selling previous editions, expert consultant Todd W. Mathers... |
|
Result Page: 9 8 7 6 5 4 3 2 1 |