|
|
|
|
|
Windows XP Pocket ReferenceWindows XP Pocket Reference is a handy book for power users and system administrators who need a solid reference with quick answers, but not a lot of explanation. This book is a powerful tool that quickly covers XP's applications and tools, tasks and settings, and commands.
This pocket reference is... | | Real World Linux Security (2nd Edition)
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or... | | Hunting Security BugsYour essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before... |
|
Zen and the Art of Information SecurityWhile security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable... | | Programming INDIGOMicrosoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.
I wrote my first communication program over 20 years ago and... | | Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable AssetsInside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive... |
|
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole
new level. Whether you’re in the IT department, a systems integrator, a business
leader, or an end user, Fusion Applications has more of what you need, less of
what you don’t, and some of what you didn’t even think possible.
... | | | | Implementing CIFS: The Common Internet File System"The book that Microsoft should have written, but didn't." —Jeremy Allison, Samba Team
"Your detailed explanations are clear and backed-up with source code—and the numerous bits of humor make a dry subject very enjoyable to read." —J.D. Lindemann, network engineer, Adaptec, Inc.
The... |
|
|
Result Page: 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 |