|
|
|
|
Cyber Adversary Characterization: Auditing the Hacker MindA book about hacking is a book about everything. First, the meaning of hacker.
The word “hacker” emerged in an engineering context and became popular at The Massachusetts Institute of Technology (MIT), among other places, as a way to talk about any ingenious, creative, or unconventional use of a machine ... | | IBM InfoSphere Replication Server and Data Event Publisher
Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many... | | Instant Lift Web Applications
Get to know the Lift Web Framework quickly and efficiently using practical, hands-on recipes
Overview
-
Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
-
Develop your own Lift web applications, find practical examples for many common use cases.
... |
|
|
|
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |