Home | Amazing | Today | Tags | Publishers | Years | Search 
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Windows Server Hacks
Windows Server Hacks
The tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT,...
Microsoft IIS 6 Delta Guide (Internet Information Server)
Microsoft IIS 6 Delta Guide (Internet Information Server)
Microsoft's Internet Information Server 6 is an Internet server program that works with the Windows Server 2003 operating system. IIS is Microsoft's answer in the Internet server market to Apache, the open source and #1 Internet server in use. In the US 9.7 million servers run IIS (28 percent of the market) powering 5.3 million .com domains....
Inside COM+ Base Services (Microsoft Programming Series)
Inside COM+ Base Services (Microsoft Programming Series)
COM+ is not a radical departure from COM-it is the next stage of evolution of the COM programming model. COM was originally designed as a minimalist's component architecture. With the advent of the three-tier programming model, applications have become more complex. To help developers who work in this new world, COM+ offers a richer set of services...
Linux Desktop Hacks
Linux Desktop Hacks

With hacks that any user can follow, Linux Desktop Hacks demonstrates how easy it is to modify Linux to suit your desires. The book is packed with tips on customizing and improving the interface, boosting performance, administering your desktop, and generally making the most out of what X, KDE,...

Pro SQL Server 2008 XML (Expert's Voice in SQL Server)
Pro SQL Server 2008 XML (Expert's Voice in SQL Server)
Back in 1999, I was working for a dot-com when I was first exposed to the interesting new technology known as XML. My imagination ran wild, and I immediately began working on dozens of applications for XML, like custom reporting from our legacy inventory system and Web-based business-to-business ordering. I was as excited as a kid on...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The Wolf of Wall Street
The Wolf of Wall Street

Now a major motion picture directed by Martin Scorsese and starring Leonardo DiCaprio

NEW YORK TIMES BESTSELLER
 
By day he made thousands of dollars a minute. By night he spent it as fast as he could, on drugs, sex, and international globe-trotting. From the binge that sank a
...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Hedge Fund Course (Wiley Finance)
Hedge Fund Course (Wiley Finance)
A self-study course that reviews the technical and quantitative knowledge necessary to properly manage a hedge fund Today, traditional asset managers are looking to develop their own hedge funds as alternative offerings to their clients. Hedge Fund Course presents all the technical and quantitative knowledge necessary to run a leveraged investment...
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
"A phenomenal resource for both extreme and not-so-extreme researchers. Great tips, clear explanations, and years of expertise distilled into 250 pages of clear, engaging text. This book should be on every searcher's desk."  —Mary Ellen Bates, coauthor, Researching Online for Dummies

The
...
Advances in Mobile Radio Access Networks
Advances in Mobile Radio Access Networks
This book gives a comprehensive overview of the technologies for the advances of
mobile radio access networks. The topics covered include linear transmitters,
superconducting filters and cryogenic radio frequency (RF) front head, radio over
fiber, software radio base stations, mobile terminal positioning, high speed
downlink
...
Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy