Home | Amazing | Today | Tags | Publishers | Years | Search 
Multitool Linux: Practical Uses for Open Source Software
Multitool Linux: Practical Uses for Open Source Software

This resource-packed guide delivers pragmatic solutions for real-world Linux development needs—all using open-source software tools. Viewing Linux as a well-stocked toolbox, Multitool Linux shows programmers and sophisticated users how to create a wide variety of exciting and useful applications for business and...

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Novell GroupWise 7 Administrator Solutions Guide
Novell GroupWise 7 Administrator Solutions Guide

Novell GroupWise 7 Administrator Solutions Guide is the authoritative guide for successfully administrating and maintaining the newest release of Novell's communication and collaboration solution. Author Tay Kratzer, a Novell Premium Service-Primary Support Engineer, will provide you with insider...

Advanced .NET Remoting, Second Edition
Advanced .NET Remoting, Second Edition

With the arrival of .NET remoting, any programmer who wants to work with distributed objects can benefit from Advanced .NET Remoting, a solid tour of basic and expert techniques for working with distributed code on Microsoft's newest platform.

This title's concise, code-centered approach, backed up by judicious...

Professional J2EE Programming with BEA WebLogic Server
Professional J2EE Programming with BEA WebLogic Server
Despite its wordy title, Professional Java 2 Enterprise Edition with BEA WebLogic Server actually is one of the better books that you can get for learning JSP-based programming with Java and Enterprise JavaBeans (EJBs). By highlighting practical matters--including setting up and running the popular BEA WebLogic Server, and benchmarking...
WebRAD: Building Database Applications on the Web with Visual FoxPro and Web Connection
WebRAD: Building Database Applications on the Web with Visual FoxPro and Web Connection
A tutorial for novices and a reference for experienced users, featuring step-by-step guidelines for using Web Connection in a day-to-day manner as a developer, this book offers several development alternatives based on the user's style. Demonstrated are the building of two different applications, one easy and one more complex, and nearly two...
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
PHP & MySQL Web Development All-in-One Desk Reference For Dummies
PHP & MySQL Web Development All-in-One Desk Reference For Dummies
Webmasters and Web programmers around the world know that PHP and MySQL provide a robust, easy-to-learn, open-source solution for creating dynamic, database-driven Web sites for eCommerce and content management. In fact, PHP is used in one of every three Web sites on the Internet and MySQL has been downloaded millions of times. PHP and MySQL...
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Cisco®-authorized, self-paced learning tool for CCNA® foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers,...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy