|
|
|
|
|
|
Writing Security Tools and ExploitsExploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,... | | Advanced Linux 3D Graphics Programming (With CD-ROM)Advanced Linux 3D Graphics Programming builds upon the foundation set in Norman Lin's Linux 3D Graphics Programming. This second volume provides programmers who are experienced in both Linux and fundamental 3D graphics concepts with a well-rounded perspective on 3D theory and practice within the context of programming larger interactive 3D... | | |
|
Test Driving Linux: From Windows to Linux in 60 SecondsFor years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you... | | Current Pediatric Therapy (Current Therapy)Generations of practitioners have turned to this reference for the most recent advances in therapeutic care - including medical and surgical therapies, preventive medicine, adolescent gynecology, and behavioral issues. Now, CURRENT PEDIATRIC THERAPY is more of a bargain than ever before! The 18th Edition includes access to a web site for convenient... | | |
|
|
Result Page: 390 389 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 |