Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
IPv6 Essentials
IPv6 Essentials
IPv6, the next generation Internet Protocol, has been in the works since the early 90s when the rapid growth of the Internet threatened to exhaust existing IP addresses. Drawing on 20 years--operational experience with the existing protocol (IPv4), the new protocol offers scalability, increased security features, real-time traffic support, and...
Wicked Cool PHP: Real-World Scripts That Solve Difficult Problems
Wicked Cool PHP: Real-World Scripts That Solve Difficult Problems
PHP is an easy-to-use scripting language perfect for quickly creating the Web features you need. Once you know the basics of how the language works, wouldn't it be great to have a collection of useful scripts that solve those tricky problems and add interesting functionality to your site? We thought so, too.

Instead of starting at "Hello...

More About High-volume Web Sites (IBM Redbooks)
More About High-volume Web Sites (IBM Redbooks)

In 1999, Dr Willy Chiu, noticing the emergence of many large and complex customer Web sites, and observing how they often failed to deliver the expected robustness and customer satisfaction, set up a new team within IBM called the High-Volume Web Sites (HVWS) team. This team was chartered to work with customers and IBM internal teams involved in...

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Broadband Internet: Access, Regulation and Policy
Broadband Internet: Access, Regulation and Policy
The internet has become so widespread that such issues as access, regulation and related policies have become major factors in the economy and social fabric of societies in every part of the world. Peoples without running water are demanding access to the internet and those without it are becoming deprived citizens. This new book examines current...
JNCIP: Juniper Networks Certified Internet Professional Study Guide
JNCIP: Juniper Networks Certified Internet Professional Study Guide

Here’s the book you need to prepare for the hands-on JNCIP exam, CERT-JNCIP-M, from Juniper Networks. Written by the Juniper Networks trainer who helped develop the exam, this Study Guide provides the information and insights you need to approach the challenging JNCIP hands-on lab exam with confidence.

Authoritative coverage of all...

R Graph Cookbook
R Graph Cookbook

This hands-on guide cuts short the preamble and gets straight to the point – actually creating graphs, instead of just theoretical learning. Each recipe is specifically tailored to fulfill your appetite for visually representing you data in the best way possible. This book is for readers already familiar with the basics of R who want to...

WordPress 24-Hour Trainer
WordPress 24-Hour Trainer

The easy, self-paced guide to the powerful WordPress platform WordPress 24-Hour Trainer, 3rd Edition provides a comprehensive, unique book-and-video package that focuses on the practical, everyday tasks you will face when creating and maintaining WordPress websites.

This easy-to-use, friendly guide will show you how to create
...

Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition

Snort, Information Security Magazine’s pick for Open Source Product of the year 2003, is one of the best examples of the IT community working together to build a capability. Please notice I did not say a tool, but rather, a capability. Snort’s extensible architecture and open source distribution has long made it an ideal choice...

Broadband Internet Deployment in Japan (Advanced Information Technology)
Broadband Internet Deployment in Japan (Advanced Information Technology)
Japan is well-known as the country where the penetration ratio of the intelligent cellular phone system is large. In 2007, it was reported that in the cellular phone system in Japan, the total volume of data traffic became larger than that of voice traffic. Now, the telecommunication infrastructure is going to be converged with broadcasting...
Configuring Sonicwall Firewalls
Configuring Sonicwall Firewalls
Every enterprise requires at least one firewall to provide the backbone for its network
security architecture. Firewalls are the core component of your network’s security.
The risks today have greatly increased, so the call for a stronger breed of firewall
has been made. In the past, simple packet-filtering firewalls allowing
...
unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy