Home | Amazing | Today | Tags | Publishers | Years | Search 
Fedora Bible 2011 Edition: Featuring Fedora Linux 14
Fedora Bible 2011 Edition: Featuring Fedora Linux 14

With the Fedora Linux operating system and the instructions in this book, you can transform your PC into a safe, powerful, and free computer system. Starting with Fedora, you can easily replace (or coexist with) Microsoft Windows on your everyday desktop computer. You can also configure your computer to share your files, printers, Web pages,...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Drinking Water and Infectious Disease: Establishing the Links
Drinking Water and Infectious Disease: Establishing the Links

There still exists considerable uncertainty in many countries about the contribution of drinking water to sporadic cases of disease. The Organization for Economic Cooperation and Development (OECD), in cooperation with the World Health Organization (WHO), led the Workshop on Molecular Technologies for Safe Drinking Water in 1998 to address...

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

A company’s most important asset next to its people is its information. This information includes intellectual property, company financial information, confidential employee information, customer information, and so much more. Company information may be stored in databases, spreadsheets, flat files, and so on. Loss of...

Java Performance
Java Performance
Today, Java is used at the heart of the world’s largest and most critical computing systems. However, when I joined the Java team in 1997 the platform was young and just gaining popularity. People loved the simplicity of the language, the portability of bytecodes, and the safety of garbage collection (versus traditional...
The CERT® Oracle® Secure Coding Standard for Java (SEI Series in Software Engineering)
The CERT® Oracle® Secure Coding Standard for Java (SEI Series in Software Engineering)

An essential element of secure coding in the Java programming language is a welldocumented and enforceable coding standard. The CERT Oracle Secure Coding Standard for Java provides rules for secure coding in the Java programming language. The goal of these rules is to eliminate insecure coding practices that can lead to exploitable...

The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
Whether you’re shopping for clothes from your computer or mobile phone, or selling artworks around the globe, you face a dizzying array of choices and decisions. How do I pay? How do I get paid? What if something goes wrong?

The answer? PayPal.

We are—and will continue to be—the
...
New Perspectives on Computer Concepts 2012: Introductory
New Perspectives on Computer Concepts 2012: Introductory
Synchronicity. It’s all about students and instructors tuning in to each other. And technology makes it possible. In a world of networks, e-mail, webinars, and social networking sites, technology can certainly strengthen the link between instructors and students.

New Perspectives on Computer Concepts 2012 is
...
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Wearable Robots: Biomechatronic Exoskeletons
Wearable Robots: Biomechatronic Exoskeletons
Being a multidisciplinary area involving subjects such as mechanics, electronics and computing, the evolution and spread of robotics to different application sectors still requires intense interaction with other fields of science and technology. This applies equally when dealing with wearable robots, meaning robotic systems that a...
Developing Web Applications with Haskell and Yesod
Developing Web Applications with Haskell and Yesod

This fast-moving guide introduces web application development with Haskell and Yesod, a potent language/framework combination that supports high-performing applications that are modular, type-safe, and concise. You’ll work with several samples to explore the way Yesod handles widgets, forms, persistence, and RESTful content....

Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy