Home | Amazing | Today | Tags | Publishers | Years | Search 
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Advanced C# Programming
Advanced C# Programming

Your Definitive Professional Resource

Build solutions for the Microsoft .NET platform quickly and easily with C#--an efficient, object-oriented language. Advanced C# Programming thoroughly explains real-world solutions you can apply to a wide range of business applications or to programming problems. This book also reviews...

Six Sigma--The First 90 Days
Six Sigma--The First 90 Days
The new Six Sigma has had no less than a dazzling debut, starting in late 1994 with AlliedSignal. Originated in 1987 at Motorola, Six Sigma was adopted by very few companies, though it was not taken very seriously. Only after AlliedSignal (now known as Honeywell) demonstrated Six Sigma's effectiveness in redefining a company, achieving dramatic...
Professional Portal Development with Open Source Tools: JavaTM Portlet API, Lucene, James, Slide
Professional Portal Development with Open Source Tools: JavaTM Portlet API, Lucene, James, Slide
Open source technology enables you to build customized enterprise portal frameworks with more flexibility and fewer limitations. This book explains the fundamentals of a powerful set of open source tools and shows you how to use them.

An outstanding team of authors provides a complete tutorial and reference guide to Java Portlet API, Lucene,...

TCP/IP Network Administration
TCP/IP Network Administration
This book is intended for everyone who has a UNIX computer connected to a TCP/IP network. This
obviously includes the network managers and the system administrators who are responsible for setting
up and running computers and networks, but it also includes any user who wants to understand how his
or her computer communicates with
...
Effective Enterprise Java
Effective Enterprise Java

If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to:

  • Use in-process or local storage to avoid the network

    ...
Negotiate and Win: Unbeatable Real-World Strategies from the NYPD's Top Negotiator
Negotiate and Win: Unbeatable Real-World Strategies from the NYPD's Top Negotiator

Every day, you participate in negotiations. Whether you’re working out a deal with a client, asking for a raise, discussing a weekly allowance with your child, or planning a weekend with your spouse, your life is filled with this intricate process. In Negotiate and Win, former NYPD hostage negotiator Dominick Misino breaks...

Managing Software Deliverables, First Edition : A Software Development Management Methodology
Managing Software Deliverables, First Edition : A Software Development Management Methodology

Managing Software Deliverables—A Software Development Management Methodology describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) function in a corporate setting. Every business that has people performing Software Project Management (PM) activities has a need for these...

Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication...
Sams Teach Yourself Crystal Reports 9 in 24 Hours
Sams Teach Yourself Crystal Reports 9 in 24 Hours

Sams Teach Yourself Crystal Reports X in 24 Hours will guide the Crystal Reports users through conceptual topics, such as understanding data sources, to creating simple reports using the provided report wizards to custom reporting creation, modification and design techniques. This book will cover the latest version of Crystal Reports. The...

Pinnacle Studio 10 for Windows : Visual QuickStart Guide
Pinnacle Studio 10 for Windows : Visual QuickStart Guide
Pinnacle Studio 10 is the latest version of the industry leading home video editing tool aimed at the Windows consumer market. In Pinnacle Studio 10 for Windows: Visual QuickStart Guide, veteran journalist and teacher Jan Ozer tackles Pinnacle Studio version 10 in classic and popular QuickStart style--with step-by-step instructions, plenty of...
Content Networking Fundamentals
Content Networking Fundamentals

A comprehensive introduction to the theory and practical applications of content networking 

  • Get a strong introduction to the basic networking concepts necessary for content networking, including network address translation, IP multicast content delivery, quality of service, and...

Result Page: 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy