Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Phone Programming: and its Application to Wireless Networking
Mobile Phone Programming: and its Application to Wireless Networking
The technology evolution has been once and for all beyond comparison during the past decade or two. Any of us can nowadays do numerous things with numerous devices to help in everyday life. This applies not least to mobile phones. If we compare the feature set of a mobile phone model in 1995 with the latest smartphone models the most visible...
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

Objects First with Java: A Practical Introduction Using BlueJ
Objects First with Java: A Practical Introduction Using BlueJ
Welcome to the first introductory programming textbook that completely integrates BlueJ with the teaching of object-oriented principles using Java.

BlueJ is a Java development environment that runs on top of the Sun Microsystems Java Development Kit making use of the standard compiler and virtual machine. It has been specifically designed...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Expert C Programming
Expert C Programming
Browsing in a bookstore recently, I was discouraged to see the dryness of so many C and C++ texts. Few authors conveyed the idea that anyone might enjoy programming. All the wonderment was squeezed out by long boring passages of prose. Useful perhaps, if you can stay awake long enough to read it. But programming isn't like that!

Programming is...

Core Swing: Advanced  Programming
Core Swing: Advanced Programming

The experienced developer's guide to the Swing classes!

Core Swing helps you deliver the sophisticated Java GUI applications your users demand—with Java Swing techniques that start where other books leave off! Building on his bestseller Core Java Foundation Classes, Kim Topley takes on the toughest Swing...

Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)
Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)

Radia Perlman's Interconnections is recognized as a leading text on networking theory and practice. It provides authoritative and comprehensive information on general networking concepts, routing algorithms and protocols, addressing, and the mechanics of bridges, routers, switches, and hubs. This Second...

PPP Design, Implementation, and Debugging (2nd Edition)
PPP Design, Implementation, and Debugging (2nd Edition)
Extensively revised and expanded to cover the latest developments in PPP and network technology, this second edition addresses such current topics as:
  • PPP in today's telecommunications infrastructure
  • PPP and telephony
  • Optical (SONET/SDH) PPP links
  • The relationship between PPP and...
RSS and Atom in Action: Web 2.0 Building Blocks
RSS and Atom in Action: Web 2.0 Building Blocks

RSS and Atom in Action is organized into two parts. The first part introduces the blog technologies of news feed formats and publishing protocols-the building blocks. The second part shows how to put to those blocks together to assemble interesting and useful blog applications. In keeping with the behind Manning's "In...

Sams Teach Yourself Web Services in 24 Hours
Sams Teach Yourself Web Services in 24 Hours

According to recent press reports, everyone is developing Web Services, but many are still in the exploratory phase - learning what's involved and how to achieve ROI. This book is designed to give a working introduction to Web Services to help decision-makers prepare for the implementation in their companies. It demystifies the topic by...

IPv6 Essentials
IPv6 Essentials
IPv6, the next generation Internet Protocol, has been in the works since the early 90s when the rapid growth of the Internet threatened to exhaust existing IP addresses. Drawing on 20 years--operational experience with the existing protocol (IPv4), the new protocol offers scalability, increased security features, real-time traffic support, and...
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy