Home | Amazing | Today | Tags | Publishers | Years | Search 
CGI Programming with Perl
CGI Programming with Perl
Programming on the Web today can involve any of several technologies, but the Common Gateway Interface (CGI) has held its ground as the most mature method--and one of the most powerful ones--of providing dynamic web content. CGI is a generic interface for calling external programs to crunch numbers, query databases, generate customized graphics, or...
Mastering AutoCAD 2008 and AutoCAD LT 2008
Mastering AutoCAD 2008 and AutoCAD LT 2008
The World's Bestselling AutoCAD Resource Fully Updated for 2008

There's a reason why Mastering AutoCAD is so popular year after year. Loaded with concise explanations, step-by-step instructions, and hands-on projects, this comprehensive reference and tutorial from award-winning author George Omura has everything you...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Excel 2007 Workbook For Dummies (Computer/Tech)
Excel 2007 Workbook For Dummies (Computer/Tech)
From formulas to functions to the latest features — practice and plan Excel tasks with ease

Confused by Excel? Want to make the most of its capabilities? No worries — this hands-on workbook gets you up to speed in a step-by-step manner. From navigating the new user interface and creating your first spreadsheet to using formulas,...

Mobile Multimedia Communications: Concepts, Applications, and Challenges (Premier Reference Source)
Mobile Multimedia Communications: Concepts, Applications, and Challenges (Premier Reference Source)
Mobile multimedia communication is increasingly in demand because of the basic need to communicate at any time, anywhere, using any technology. In addition, to voice communication, people have a desire to access a range of other services that comprise multimedia elements—text, image, animation, high fidelity audio and video using mobile...
Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition
CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition

This book focuses on the objectives for the CWNA exam, but it's also a useful learning tool for anyone wanting to master the many domains of wireless. You’ll learn about wireless technology basics such as radio frequency—based communications, and you’ll learn about specific standards and protocols that ...

Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
The 18th Tyrrhenian Workshop on digital communications is devoted to wireless communications. In the last decade, wireless communications research boosted launching new standards and proposing new techniques for the access technology. We moved from the UTRA standard capable to transmit 0.5 bit/s/Hz to WLAN which is promising 2.7 bit/s/Hz. Now...
Cisco Networking Simplified (2nd Edition) (Networking Technology)
Cisco Networking Simplified (2nd Edition) (Networking Technology)
Now 100 percent updated for the latest technologies, this is today’s easiest, most visual guide to Cisco® networking. Even if you’ve never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and...
Handbook of Biometrics
Handbook of Biometrics
Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of...
Oracle Application Server Portal Handbook (Osborne Oracle Press)
Oracle Application Server Portal Handbook (Osborne Oracle Press)
Wasn’t the Web supposed to make everything easier? Oh sure, the maturation of companies doing business on the Web has made things more reliable and more secure, but easier? If you’ve been using the Web for a while (5+ years), you’ve noticed the evolution from static web pages to dynamic content. AJAX and other technologies provide...
Result Page: 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy