 |
|
|
 MATLAB Primer, Sixth EditionThis fifth edition extends the MATLAB Primer, representing the significant features introduced in MATLAB 5 and reflecting a dramatic change in the text . This pocket book serves as an excellent resource for students and engineers requiring a high-level introduction and handy reference to MATLAB 5, helping readers to learn efficiently and... |  |  Smart Cards: The Developer's ToolkitThe technical groundwork has been laid for wide-spectrum exploitation of smart card technology in both commercial and enterprise venues. Our goal in this book is to provide IT managers, system architects, system analysts, and application developers with the basic information about smart card technology that they need to open the tap on the... |  |  Mastering Perl/TkPerl/Tk is the marriage of the Tk graphical toolkit with Perl, the powerful programming language used primarily for system administration, web programming, and database manipulation. With Perl/Tk, you can build Perl programs with an attractive, intuitive GUI interface with all the power of Perl behind it. Mastering Perl/Tk is the... |
|
|
 CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.
Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused... |  |  Security for Wireless Ad Hoc NetworksWireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature... |  |  Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... |
|
| Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |