|
|
|
|
|
Hacker Debugging Uncovered (Uncovered series)Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of... | | Cellular Authentication for Mobile and Internet ServicesAn invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networks
Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure... | | Cisco ASA Configuration (Networking Professional's Library)Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of... |
|
CCNP Security Secure 642-637 Official Cert Guide
Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
... | | Virtualization Security: Protecting Virtualized Environments
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,... | | |
|
The Definitive Guide to ARM® Cortex®-M3 and Cortex®-M4 Processors, Third Edition
This new edition has been fully revised and updated to include extensive information on the ARM Cortex-M4 processor, providing a complete up-to-date guide to both Cortex-M3 and Cortex-M4 processors, and which enables migration from various processor architectures to the exciting world of the Cortex-M3 and M4.
This book presents the... | | Windows 8 For Dummies
The bestselling tech book of all time, now updated for Windows 8
Microsoft Windows is the operating system that runs nearly 90 percent of the world's computers. Windows 8 will offer new interface updates, cloud-based services, and much more. This update of Andy Rathbone's bestselling Windows guide covers all the... | | Hydraulic Fracturing Chemicals and Fluids Technology
When classifying fracturing fluids and their additives, it is important that production, operation, and completion engineers understand which chemical should be utilized in different well environments. A user's guide to the many chemicals and chemical additives used in hydraulic fracturing operations, Hydraulic Fracturing Chemicals and... |
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |