 |
|
|
|
 |  |  Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his
chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made
furniture late in life that was in superficial respects the same as that which he made earlier,
but one can see his craft advance.
... |  |  |
|
 iOS 5 in the Enterprise (Develop and Design)
Those of you who have to deal with more than a handful of iPhones, iPads, or iPod
Touches already know why you manage iOS devices. For everyone else, “manage”
is not a short way to say “impose draconian control.” Managing devices on your
network, including iOS devices, ... |  |  |  |  Introducing Regular Expressions
This book shows you how to write regular expressions through examples. Its goal is to
make learning regular expressions as easy as possible. In fact, this book demonstrates
nearly every concept it presents by way of example so you can easily imitate and try
them yourself.
Regular expressions ... |
|
| Result Page: 802 801 800 799 798 797 796 795 794 793 792 791 790 789 788 787 786 785 784 |