 |
|
 |  |  Internet Forensics
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to ... |  |  Linux for Non-Geeks: A Hands-On, Project-Based, Take-It-Slow GuidebookThis resource is for those who have switched or will be switching to Linux; it avoids tech-talk, but focuses on subjects appealing to the average Joe--installation, playing CDs, the Internet, games, printing, and more.
This book is for any home user who has switched or is thinking of switching to Linux. Based on Red Hat's... |
|
 |  |  Enterprise Java 2 Security: Building Secure and Robust J2EE Applications The purpose of this book is to illustrate the applicability of Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security technologies in building a secure enterprise infrastructure containing Java-based enterprise applications. With a pragmatic approach, the book explains why Java security... |  |  |
|
|
|
Result Page: 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 |