 |
|
 Unix Unleashed: Internet EditionThe first edition of Unix Unleashed provided a thick, comprehensive guide to the basic tools of the Unix trade, covering everything from system administration to the windowing system to the compiler environments. The guide also featured information on other tools, such as the vi editor, the command shells, the AWK, PERL, C and C++... |  |  Professional ASP.NET 1.0 (2002 Edition)This comprehensive compendium provides a broad and thorough investigation of all aspects of programming with ASP.NET. Entirely revised and updated for the Golden Release of .NET, this book will give you the information you need to master ASP.NET and build dynamic, successful, enterprise Web applications.
With this Special Edition, you can... |  |  Microsoft C# Language SpecificationsIf you are holding this book in your hands, no doubt you want information about Microsoft .NET and you want it now. You have heard about how .NET will allow developers to create programs that will transcend device boundaries and fully harness the connectivity of the Internet in their applications. You have read in the news journals... |
|
 Hacker Web Exploitation UncoveredWritten from both from the attacker's and security specialist's perspective, this thorough guide uncovers how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.
A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is... |  |  Visual C++ Optimization with Assembly CodeDescribing how the Assembly language can be used to develop highly effective C++ applications, this guide covers the development of 32-bit applications for Windows. Areas of focus include optimizing high-level logical structures, creating effective mathematical algorithms, and working with strings and arrays. Code optimization is considered for... |  |  Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... |
|
|
 PC Repair Bench BookYour one-stop guide to
- Understanding and repairing motherboards, processors, chipsets, BIOS, and system resources
- Updating and optimizing memory and aging systems
- Diagnosing common PC problems and performing routine maintenance
- Installing and configuring system upgrades
- Working
... |  |  JavaScript Bible, Gold EditionThe JavaScript Bible, Gold Edition covers the new powerful functionality JavaScript gains with the release of the new fifth generation revisions of Internet Explorer and Netscape Communicator. The book includes all the great content included in the JavaScript Bible, 4th Edition, an international bestseller, plus over 400 pages of... |  |  |
|
Result Page: 588 587 586 585 584 583 582 581 580 579 578 577 576 575 574 573 |