Home | Amazing | Today | Tags | Publishers | Years | Search 
DNS and BIND on IPv6
DNS and BIND on IPv6

I’m sorry for writing this ebook.

Well, that’s not quite accurate. What I mean is, I’m sorry I didn’t have time to update DNS and BIND to include all this new IPv6 material. DNS and BIND deserves a sixth edition, but I’m afraid my schedule is so hectic right now that I just don’t have time to...

Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Membrane Technology and Applications
Membrane Technology and Applications
My introduction to membranes was as a graduate student in 1963. At that time membrane permeation was a sub-study of materials science. What is now called membrane technology did not exist, nor did any large industrial applications of membranes. Since then, sales of membranes and membrane equipment have increased more than...
iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more
iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more

Everyone seems to have an opinion as to why their favorite mobile platform is better than the others. Some prefer iOS, others choose Android—each platform has its pros and cons. For me, however, iOS stands above the rest in large part due to its use of powerful native frameworks.

Sure, frameworks and...

Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology
Business intelligence and data warehousing projects can be challenging and complex. Dealing with new technologies, processes, and different stakeholders presents an array of potential problems. To aid the project manager, there are recipes about project definition, scope, control, and risk management. Requirements, design, data analysis,...
Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

The Esoteric Investor: Alternative Investments for Global Macro Investors
The Esoteric Investor: Alternative Investments for Global Macro Investors

Massive demographic, environmental, economic, and regulatory shifts are generating huge new investment opportunities with an exceptionally high probability of success over the coming years and decades. In The Esoteric Investor, a world-class portfolio manager identifies these investments, and shows how your best...

The Nidoviruses: Toward Control of SARS and other Nidovirus Diseases (Advances in Experimental Medicine and Biology)
The Nidoviruses: Toward Control of SARS and other Nidovirus Diseases (Advances in Experimental Medicine and Biology)
This book summarizes the keynote and plenary speeches and posters of the “Xth International Nidovirus Symposium: Toward Control of SARS and Other Nidovirus Diseases” that was held in Colorado Springs, Colorado, June 25–30, 2005. The nine previous meetings of scientists investigating the molecular biology and...
Brain-Mind Machinery: Brain-inspired Computing and Mind Opening
Brain-Mind Machinery: Brain-inspired Computing and Mind Opening

Brain and mind continue to be a topic of enormous scientific interest. With the recent advances in measuring instruments such as two-photon laser scanning microscopy and fMRI, the neuronal connectivity and circuitry of how the brain's various regions are hierarchically interconnected and organized are better understood now than ever...

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy