Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Concepts of Database Management
Concepts of Database Management
This concise yet comprehensive introduction to fundamental database concepts is an indispensable resource to develop your knowledge of database management concepts. Now in its sixth edition, Concepts of Database Management maintains the focus on real-world cases that made previous editions so effective addressing the most current database issues...
Macromedia Flash Communication Server MX
Macromedia Flash Communication Server MX

Flash Communicator Server MX is your complete guide to integrating rich media and real-time collaboration into your applications with Flash Communication Server MX! It includes 10 quick steps for getting started and covers ActionScripting, Flash Remoting, and other key implementation issues...

CCIE Security Practice Labs (CCIE Self-Study)
CCIE Security Practice Labs (CCIE Self-Study)

The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers,...

Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

LDAP Programming, Management, and Integration
LDAP Programming, Management, and Integration
Focusing on the practical application of the Lightweight Directory Access Protocol, this tutorial is geared toward IS professionals and software developers who are responsible for getting the maximum potential from their directories by integrating them with existing processes and applications. As the Internet standard for directory services, LDAP...
Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
Adobe Acrobat 9 PDF Bible
Adobe Acrobat 9 PDF Bible
" The Adobe Acrobat 9 PDF Bible is the comprehensive guide to Acrobat for novices and power users alike. With its concise, easy-to-read format, this book will have you creating interactive XML forms, enabling streamlined document review processes, and publishing high-impact electronic documents in no time."

— Rick...

Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)
LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)
Offering you thorough coverage of the new version of the leading Linux certification from Linux Professional Institute (LPI), this book covers both objectives and materials tested in the two required LPIC-1 exams: LPI 101 and LPI 102. You’ll certainly appreciate the clear, concise information on key exam topics, including using Linux command...
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the...

Control and Automation: International Conference, CA 2009, Held as Part of the Future Generation Information Technology Conference
Control and Automation: International Conference, CA 2009, Held as Part of the Future Generation Information Technology Conference

As future generation information technology (FGIT) becomes specialized and fragmented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the...

unlimited object storage image
Result Page: 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy