Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)

Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...

Wireless Internet Security: Architecture and Protocols
Wireless Internet Security: Architecture and Protocols
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for...
Road User Charging and Electronic Toll Collection
Road User Charging and Electronic Toll Collection

As highways, crossing points, and urban streets become increasingly jammed with traffic, more and more roadway authorities are turning to electronic tolling and pricing to manage traffic and road usage. This authoritative book offers professionals expert guidance in planning, procuring, and operating electronic tolling and road-user charging...

Philosopher Kings?: The Adjudication of Conflicting Human Rights and Social Values
Philosopher Kings?: The Adjudication of Conflicting Human Rights and Social Values

Philosopher Kings? The Adjudication of Conflicting Human Rights and Social Values, by George C. Christie, examines the attempts by courts to sort out conflicts involving freedom of expression, including religious expression, on the one hand, and rights to privacy and other important social values on the other. It...

Mashup Patterns: Designs and Examples for the Modern Enterprise
Mashup Patterns: Designs and Examples for the Modern Enterprise
Using new mashup tools and technologies, enterprise developers can impose their own APIs on everything from Web sites and RSS feeds to Excel and PDF files–transforming a world of content into their own customized informationsource. In Mashup Patterns, Michael Ogrinz applies the concept of software development...
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

Add cybersecurity to your value proposition and protect your company from cyberattacks

Cybersecurity is now a requirement for every company in the world regardless of size or industry. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit covers everything a founder, entrepreneur and...

Windows Vista(TM) Administrator's Pocket Consultant
Windows Vista(TM) Administrator's Pocket Consultant

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of Windows Vista. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the precise information you need to solve problems and get the job done—whether you’re at...

Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Practice the IT Skills Essential for Your Success

  • 60+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results...
The Complete Idiot's Guide to Etiquette, Second Edition
The Complete Idiot's Guide to Etiquette, Second Edition
Mary Mitchell, Ms. Demeanor herself, takes you through Y2K and beyond with The Complete Idiot's Guide to Etiquette, Second Edition. Topics covered include gifts and e-commerce: can you "wrap" an electronic gift?, telecommuting and the home office: the impact on family and friends, and volunteering: the fine line between being Mother...
Resumes For Dummies
Resumes For Dummies

Write a winning resume and land that job interview!

Is your job search stalling out after you submit a resume but before you're offered an interview? With a recession that has caused a 10% unemployment rate affecting 15.3 million Americans, having a winning resume is vital to securing an interview-and it demands a fresh look at...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy