Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco Security Specialist's Guide to PIX Firewall
Cisco Security Specialist's Guide to PIX Firewall
The objective of this book is to provide you with a thorough understanding of the
Cisco PIX firewalls.Whether you have administrative responsibilities or you are
studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA),
this comprehensive guide will be of value to you.The initial chapters cover the
basics,
...
Black Art of Java Game Programming
Black Art of Java Game Programming
Gaming on the Web is the next blockbuster business. Have any doubts? The video game industry,
which already eclipses Hollywood in terms of revenue, targets the Web as the next huge growth area.
Software developers are busily porting games to the online environment, or developing entirely new
ones. And numerous popular Web sites, many
...
Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
LightWave 3D 8: 1001 Tips & Tricks
LightWave 3D 8: 1001 Tips & Tricks
If you’re in the bookstore reading this book, buy it. It will be one of the best investments
you can make. There are years of experience in this book, and it will become
your favorite secret weapon.
William “Proton” Vaughan

What’s the next best thing to having an experienced LightWave artist at your
...
Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Symbian OS C++ for Mobile Phones
Symbian OS C++ for Mobile Phones
Programming Symbian OS is a key skill for mass market phone application development. Whether you are developing a
services for shipping mobile phones, or involved in pre-market mobile phone development, this book will help you unde
fundamental theory behind developing Symbian OS C++ code for constrained devices.

• A
...
PC Repair Bench Book
PC Repair Bench Book
Your one-stop guide to
  • Understanding and repairing motherboards, processors, chipsets, BIOS, and system resources
  • Updating and optimizing memory and aging systems
  • Diagnosing common PC problems and performing routine maintenance
  • Installing and configuring system upgrades
  • Working...
PC Technician Street Smarts: A Real World Guide to CompTIA A+ Skills
PC Technician Street Smarts: A Real World Guide to CompTIA A+ Skills
Develop the skills you need in the real world

Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at the common responsibilities of PC Technicians, with key information organized around the actual day-to-day tasks,
...
Information Extraction: Algorithms and Prospects in a Retrieval Context (The Information Retrieval Series)
Information Extraction: Algorithms and Prospects in a Retrieval Context (The Information Retrieval Series)
Information extraction regards the processes of structuring and combining content that is explicitly stated or implied in one or multiple unstructured information sources. It involves a semantic classification and linking of certain pieces of information and is considered as a light form of content understanding by the machine. Currently, there is...
A Guide to MATLAB Object-Oriented Programming
A Guide to MATLAB Object-Oriented Programming
I am an admitted object-oriented fanatic. I have been designing and implementing object-oriented software for more than twenty years. When I started designing and implementing object-oriented MATLAB®, I encountered many detractors. They would say things like “The object model isn’t complete,” “You can’t have public...
Enterprise Information Systems: 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, Revised
Enterprise Information Systems: 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, Revised
This book contains the carefully selected best papers of the 8th International Conference on Enterprise Information Sysetms, ICEIS 2006, held in Paphos, Cyprus, in May 2006.

The 4 invited papers and 27 revised and selected papers presented in this volume cover different aspects related to enterprise computing. They were selected from 63...

unlimited object storage image
Result Page: 706 705 704 703 702 701 700 699 698 697 696 695 694 693 692 691 690 689 688 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy