|
|
|
|
|
| | The Definitive Guide to SOA: Oracle® Service Bus, Second EditionThe Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects who know enterprise development but are new to enterprise service buses (ESBs) and service–oriented architecture (SOA) development. This is the first book to cover a practical approach to SOA using the BEA... | | iPhone SDK Application Development: Building Applications for the AppStoreThis practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK... |
|
Kali Linux Network Scanning Cookbook
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
About This Book
-
Learn the fundamentals behind commonly used scanning techniques
-
Deploy powerful scanning tools that are integrated into the Kali...
| | Programming the Perl DBIThe DBI is the standard database interface for the Perl programming language. The DBI is databaseindependent, which means that it can work with just about any database, such as Oracle, Sybase, Informix, Access, MySQL, etc.
While we assume that readers of this book have some experience with Perl, we don't assume much familiarity with... | | Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... |
|
Image Processing in C: Analyzing and Enhancing Digital Images with 3.5 DiskThis book is a tutorial on image processing. Each chapter explains basic concepts with words and gures, shows image processing results with photographs, and implements the operations in C. Information herein comes from articles published in The C/C++ Users Journal from 1990 through 1998 and from the first edition of this book published in 1994.... | | How to Cheat at Securing a Wireless NetworkWireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
- Denial of service (DoS) and other network layer attacks
- Unauthorized
... | | |
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 |