|
|
Python How to Program (With CD-ROM)The authoritative DEITEL™ LIVE-CODE™ introduction to Python programming
This new book by the world's leading programming language textbook authors carefully explains how to use Python as a general-purpose programming language and how to program multi-tier, client/server,... | | ASP.NET Developer's JumpStartThe purpose of ASP.NET JumpStart is to show readers the practical applications of .NET and ASP.NET by illustrating how to build Web-based applications using Web Forms and Web Services. Emphasis will be on good programming standards and practices. The reader will be taken from an introduction of the VB .NET language to intermediate topics... | | Databases DemystifiedThe fast and easy way to understanding the fundamentals of databases
If you’re tired of wading through huge technical manuals that drown you in jargon, making it difficult to decipher database fundamentals, help has finally arrived. Databases Demystified is user-friendly, engaging, easy to follow, and designed for the non-expert... |
|
Hacking Exposed: Network Security Secrets & Solutions, Third Edition"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool
"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."... | | MySQL, Second Edition (Visual QuickStart Guide)With the Web extending into every nook and cranny of modern life, there are plenty of folks out there who have data storage issues that need to be addressed-Qbut no million-dollar budgets to do so. Luckily for them, there's MySQL. Offering Oracle-like power without the huge price tag, MySQL offers a networked database that can be accessed in... | | The Shellcoder's Handbook: Discovering and Exploiting Security HolesUncover, exploit, and close security holes in any software or operating system
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This... |
|
|
|
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 |