Home | Amazing | Today | Tags | Publishers | Years | Search 
Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

JXTA: Java P2P Programming
JXTA: Java P2P Programming
JXTA: Java P2P Programming provides an invaluable introduction to this new technology, filled with useful information and practical examples. It was created by members of the JXTA community, sharing their real-world experience to introduce developers to JXTA. It starts with the fundamentals of P2P and...
JavaScript(TM) Phrasebook
JavaScript(TM) Phrasebook
Developers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few...
Microsoft SharePoint: Building Office 2003 Solutions, Second Edition
Microsoft SharePoint: Building Office 2003 Solutions, Second Edition
Almost five years ago, when I completed my sixth book, Scot Hillier’s COM+ Programming with Visual Basic (SAMS, 2000), I thought I was done with technical writing. Since then, I have seen some new technologies emerge, but...
Solving the PowerPoint Predicament: Using Digital Media for Effective Communication
Solving the PowerPoint Predicament: Using Digital Media for Effective Communication

Everyone uses PowerPoint, but how effective is your presentation at meeting the goals you've outlined? A great presentation is more than just a slideshowit's about using PowerPoint to its maximum potential to get your message across to your audience. That's the PowerPoint Predicament. Tom Bunzel reveals how to conceive, plan,...

JBoss Administration and Development, Second Edition
JBoss Administration and Development, Second Edition
The primary focus of this book is the presentation of the standard JBoss 3.0.3 architecture components from both the perspective of their configuration and architecture. As a user of a standard JBoss distribution you will be given an understanding of how to configure the standard components.

As a JBoss developer, you will be given a good
...
SAP Query Reporting
SAP Query Reporting

SAP Query Reporting

is everything an SAP user needs to know to create your own reports in SAP using Query tools, no programming required! Designed as a hands-on learning aid, you will be able to follow along and perform each new skill learned on your own SAP system....

Ubuntu Unleashed
Ubuntu Unleashed
Incorporating an advanced approach to presenting information about Ubuntu, Ubuntu Unleashed aims to provide the best and latest information that intermediate to advanced Linux users need to know about installation, configuration, system administration, server operations, and security. Written by renowned open source...
Extending and Embedding PHP
Extending and Embedding PHP
In just a few years PHP has rapidly evolved from a small niche language to a powerful web development tool. Now in use on over 14 million Web sites, PHP is more stable and extensible than ever. However, there is no documentation on how to extend PHP; developers seeking to build PHP extensions and increase the performance and functionality of their...
Apache Phrasebook (Developer's Library)
Apache Phrasebook (Developer's Library)
What is the new essential for Apache developers? The Apache Phrasebook. Packed with practical solutions, or "phrases," for tasks that the Apache developer much accomplish every day, the phrasebook fills the need for a short, functional, to-the-point reference for Apache. The code contained in the...
PHP and MySQL Web Development, Second Edition
PHP and MySQL Web Development, Second Edition
PHP and MySQL Web Development teaches the reader to develop dynamic, secure, commercial Web sites. Using the same accessible, popular teaching style of the first edition, this best-selling book has been updated to reflect the rapidly changing landscape of MySQL and PHP.

The book teaches the reader to integrate and implement these technologies...

Maximum Security (3rd Edition)
Maximum Security (3rd Edition)
Maximum Security, Third Edition provides comprehensive, platform-by-platform coverage of security issues and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. In one book, security managers and others interested in computer and network security can learn everything the hackers already know,...
Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy