|
|
|
|
|
|
| | Wireless Internet Handbook: Technologies, Standards, and ApplicationsWireless applications are definitely the next big thing in communications. Millions of people around the world use the Internet every day—to stay in touch with remote locations, follow the stock market, keep up with the news, check the weather, make travel plans, conduct business, shop, entertain themselves, and learn. The logical next... | | Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... |
|
Advanced .NET Remoting, Second Edition
With the arrival of .NET remoting, any programmer who wants to work with distributed objects can benefit from Advanced .NET Remoting, a solid tour of basic and expert techniques for working with distributed code on Microsoft's newest platform.
This title's concise, code-centered approach, backed up by judicious... | | Hacking Digital Cameras (ExtremeTech)Why waste a thousand words?
Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole... | | Red Hat Enterprise Linux 5 Administration UnleashedThis comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.
Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and... |
|
|
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 |