Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Data Push Apps with HTML5 SSE: Pragmatic Solutions for Real-World Clients
Data Push Apps with HTML5 SSE: Pragmatic Solutions for Real-World Clients

Make sure your website or web application users get content updates right now with minimal latency. This concise guide shows you how to push new data from the server to clients with HTML5 Server-Sent Events (SSE), an exceptional technology that doesn’t require constant polling or user interaction. You’ll learn how...

Practical PHP and MySQL Website Databases: A Simplified Approach (Expert's Voice in Web Development)
Practical PHP and MySQL Website Databases: A Simplified Approach (Expert's Voice in Web Development)

Practical PHP and MySQL Website Databases is a project-oriented book that demystifies building interactive, database-driven websites. The focus is on getting you up and running as quickly as possible. In the first two chapters you will set up your development and...

Data Mining: A Knowledge Discovery Approach
Data Mining: A Knowledge Discovery Approach
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First, “long enough” may, in practice, be “too long” in many applications and thus unacceptable. Second,...
MCSE Training Kit-Microsoft Windows XP Professional
MCSE Training Kit-Microsoft Windows XP Professional

Official Microsoft study guide for the skills you need on the job—and on the exam.

Learn how to set up and support the Windows® XP Professional operating system—and prepare for the Microsoft® Certified Professional (MCP) exam—with this official Microsoft study guide. Work at your own pace...

Sun Certified Security Administrator for Solaris 9 & 10 Study Guide
Sun Certified Security Administrator for Solaris 9 & 10 Study Guide

Get the book that shows you not only what--but how--to study

  • Complete coverage of all official exam objectives
  • Exam Readiness checklist at the front of the book--you’re ready for the exams when all objectives on the list are checked off
  • Real-world exercises--Step-by-step instruction...
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and...
Windows XP For Dummies, 2nd Edition
Windows XP For Dummies, 2nd Edition
Covers the latest Windows XP updates including Service Pack 2

Fully revised to quickly answer your XP questions

You asked for more coverage of Outlook Express, scanning and faxing, CD burning, and more in Windows XP For Dummies — and we delivered! This updated edition is packed with answers to your Windows XP questions, from...

Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
unlimited object storage image
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy