|
|
|
|
Hunting Security BugsYour essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before... | | JavaScript Application CookbookSeasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.
The cookbook begins with... | | eDirectory Field GuideeDirectory Field Guide is a handy reference for configuring, troubleshooting, and optimizing Novells eDirectory on NetWare, Linux, Unix, and Windows. Along with Sun ONE Directory Server and Microsoft Active Directory, Novells eDirectory is a leader in directory server software, the specialized database that enterprises employ to store... |
|
|
Applied Bioinformatics: An IntroductionConfused by cryptic computer programs, algorithms and formulae?
In this book, anyone who can operate a PC, standard software and the Internet will learn to understand the biological basis of bioinformatics of the existence as well as the source and availability of bioinformatics software how to apply these tools and interpret results... | | Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great... | | Photoshop CS5 Bible
The bestselling, comprehensive reference on Photoshop, fully updated to CS5.
Photoshop is the gold standard for image-editing programs and is used by professional photographers, graphic designers, and Web designers as well as hobbyists. More than 300,000 copies of this comprehensive reference have been sold in previous... |
|
Audience, Relevance, and Search: Targeting Web Audiences with Relevant Content
How much more effective would companies be if all the content they created for the Web reached its specific target audience? In this book, three pioneering IBM content and search experts show how to get closer to this goal than ever before. Readers will discover how to write highly relevant content containing the keywords and long-tail... | | Programming Python
If you've mastered Python's fundamentals, you're ready to start using it to get real work done. Programming Python will show you how, with in-depth tutorials on the language's primary application domains: system administration, GUIs, and the Web. You'll also explore how Python is used in databases,... | | Getting Started with Citrix XenApp 6
XenApp 6 is the leader in application hosting and virtualization delivery, allowing
users from different platforms such as Windows, Mac, Linux, and mobile devices to
connect to their business applications. It reduces resources and costs for application
distribution and management. Using Citrix XenApp 6, you can deploy secure... |
|
|
Result Page: 686 685 684 683 682 681 680 679 678 677 676 675 674 673 672 671 670 669 668 |