|
|
|
|
Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... | | | | XML Schema EssentialsThe definitive how-to guide that will get you quickly up to speed on the practical application of XML Schema! Replacing XML DTDs (Document Type Definitions) as the way in which XML documents are described and validated, XML Schema allows you to describe the structure of information in an XML document and is essential for ensuring... |
|
|
|
|
|
Result Page: 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 |