Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Insider Threats in Cyber Security (Advances in Information Security)
Insider Threats in Cyber Security (Advances in Information Security)

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book...

NHibernate 3.0 Cookbook
NHibernate 3.0 Cookbook

NHibernate is an innovative, flexible, scalable, and feature-complete open source project for data access. Although it sounds like an easy task to build and maintain database applications, it can be challenging to get beyond the basics and develop applications that meet your needs perfectly.

The NHibernate Cookbook explains each...

AutoCAD 2012 For Dummies
AutoCAD 2012 For Dummies

If you are completely new to AutoCAD or just feeling a little rusty, this book will help start the wheels turning and keep you rolling in the right direction. Tidbits of historical insight and explanations help you understand not only "how" to perform a task, but "why." David's friendly and humorous writing style makes...

Dart: Up and Running
Dart: Up and Running
When we joined Google and entered the fascinating world of web browser development more than six years ago, the web was a different place. It was clear that a new breed of web apps was emerging, but the performance of the underlying platform left much to be desired. Given our background in designing and implementing...
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

The Mikado Method
The Mikado Method

Summary

The Mikado Method is a book written by the creators of this process. It describes a pragmatic, straightforward, and empirical method to plan and perform non-trivial technical improvements on an existing software system. The method has simple rules, but the applicability is vast. As you read,...

The Internet GigaBook For Dummies
The Internet GigaBook For Dummies
This book is a general-purpose guide to all things that have to do with the
Internet. It takes on a variety of subjects — how to send and receive
e-mail, chat online, conduct Internet research, use Yahoo!, shop on eBay,
enjoy music with iTunes, and create your own Web pages. Don’t look in this
book to find out how
...
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
If this book is to succeed and help readers, its cardinal virtue must be to provide
a simple reference text. It should be an essential addition to an information
security library. As such it should also serve the purpose of being a quick
refresher for terms the reader has not seen since the days when one attended a
computing
...
Writing Apache Modules with Perl and C
Writing Apache Modules with Perl and C
This book was designed for application developers who already have some experience with web programming. We assume that you understand CGI scripting, know how to produce HTML pages dynamically, and can create fill-out forms and process their contents. We also assume that you know the basics of web server administration—if not with the Apache...
Java & XML
Java & XML

Java and XML, 3rd Edition, shows you how to cut through all the hype about XML and put it to work. It teaches you how to use the APIs, tools, and tricks of XML to build real-world applications. The result is a new approach to managing information that touches everything from configuration...

Visual Studio .NET Tips and Tricks
Visual Studio .NET Tips and Tricks
Visual Studio .NET is one of the most versatile and extensible programming tools released by Microsoft. The number of features and shortcuts available in VS.NET is truly immense, and it grows tremendously with each release. Developers who are unaware of these timesaving features surely miss out on opportunities to increase their programming...
Semantic Web Services: Theory, Tools and Applications
Semantic Web Services: Theory, Tools and Applications
Semantic Web is here to stay! This is not really a marketing campaign logo, but it is a truth that every year is becoming more and more relevant to the daily life of business world, industry and society. I do not know how it happened, but the last years, through our activities in the Special Interest Group on Semantic Web and Information Systems in...
unlimited object storage image
Result Page: 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy