Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Degunking Windows
Degunking Windows

All Windows users know that their PCs slowly develop problems—nasty gunk build-up that plagues their PCs. Here are some of the common symptoms: your PC starts to run slower, your applications will crash without warning, you can’t easily find your files and folders, you start getting tons of spam, and you encounter a host of other...

Secure Communicating Systems: Design, Analysis, and Implementation
Secure Communicating Systems: Design, Analysis, and Implementation
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical...
Your Digital Afterlife: When Facebook, Flickr and Twitter Are Your Estate, What's Your Legacy? (Voices That Matter)
Your Digital Afterlife: When Facebook, Flickr and Twitter Are Your Estate, What's Your Legacy? (Voices That Matter)

Almost without realizing it, we have shifted toward an all-digital culture. Future heirlooms like family photos, home movies, and personal letters now exist only in digital form, and in many cases they are stored using popular services like Flickr, YouTube, and Gmail. These digital possessions form a rich collection that chronicles our lives...

JBoss AS 7 Development
JBoss AS 7 Development

Learn from an expert and master JBoss Application Server through this brilliantly accessible book. It irons out the difficulties and covers creating, debugging, and securing Java EE applications. The only manual you need.

Overview

  • A complete guide for JBoss developers covering everything from basic...
Managing Linux Systems with Webmin: System Administration and Module Development
Managing Linux Systems with Webmin: System Administration and Module Development

I am more than satisfied (actually impressed) with how much system administration is possible from Webmin. Comprehensive and convenient, just about any administration I've done is covered here, along with several areas that I've hesitated to explore.
--Karel Baloun, Sr. Software Engineer, Looksmart, Ltd.

Easy, browser-based...

Designing Forms for Microsoft Office InfoPath and Forms Services 2007 (Microsoft .NET Development Series)
Designing Forms for Microsoft Office InfoPath and Forms Services 2007 (Microsoft .NET Development Series)
"Microsoft Office InfoPath represents a revolutionary leap in XML technologies and a new paradigm for gathering business-critical information. I am delighted that Scott Roberts and Hagen Green, two distinguished members of the InfoPath product team, decided to share their experience in this book."

--From the Foreword by Jean...

Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and...
Hacking exposed web applications, 3rd Edition
Hacking exposed web applications, 3rd Edition

There is no escaping the reality that businesses live on the Web today. From banks to bookstores, from auctions to games, the Web is the place where most businesses ply their trade. For consumers, the Web has become the place where they do the majority of their business as well. For example, nearly 50 percent of all retail music sales in the...

Buy-In: Saving Your Good Idea from Getting Shot Down
Buy-In: Saving Your Good Idea from Getting Shot Down
You've got a good idea. You know it could make a crucial difference for you, your organization, your community. You present it to the group, but get confounding questions, inane comments, and verbal bullets in return. Before you know what's happened, your idea is dead, shot down. You're furious. Everyone has lost: Those who...
Hacking For Dummies (For Dummies)
Hacking For Dummies (For Dummies)

Learn to hack your own system to protect against malicious attacks from outside

Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This...

IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
Create applications using Industry 4.0. Discover how artificial intelligence (AI) and machine learning (ML) capabilities can be enhanced using the Internet of things (IoT) and secured using Blockchain, so your latest app can be not just smarter but also more connected and more secure than ever before. This book covers the latest...
SUSE LINUX Enterprise Server 9 Administrator's Handbook
SUSE LINUX Enterprise Server 9 Administrator's Handbook

As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure...

unlimited object storage image
Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy