 |
|
 IBM Certification Study Guide AIX Installation and System RecoveryThe AIX and RS/6000 Certifications, offered through the Professional Certification Program from IBM, are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of the AIX operating system and RS/6000 and pSeries servers. A complete set of professional certifications are... |  |  Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... |  |  Windows 2000 Commands Pocket ReferenceThis desktop reference documents Windows 2000 command mode. It is designed for system administrators, but will also prove beneficial to many other types of users. It includes most available Windows 2000 commands, as well as the most useful system administration command-line utilities from the Resource Kit (space permitting). Resource Kit commands... |
|
 Practical C Programming, 3rd EditionThis book is devoted to practical C programming. C is currently the premier language for software developers. That's because it's widely distributed and standard. Newer languages are available, such as C++, but these are still evolving. C is still the language of choice for robust, portable programming.
This book emphasizes the skills... |  |  Sams Teach Yourself SQL in 24 Hours (3rd Edition)Sams Teach Yourself SQL in 24 Hours, Third Edition presents the key features of SQL (Structured Query Language) in an easy to understand format with updated code examples, notes, diagrams, exercises, and quizzes. New material covers more information on transactions, constructs, embedded databases, and object-oriented programming. In this... |  |  C Primer Plus (4th Edition)As with all the editions, author Stephen Prata's aim has been to create an introduction to C that is instructive, clear, and helpful. Programming concepts are explained along with details of the C language; the book does not assume that you are a professional programmer. Many short, easily typed examples illustrate just one or two concepts at a... |
|
|
 Mac OS X Advanced Development Techniques Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.
The book concentrates on teaching Cocoa development first, and then takes that knowledge and... |  |  Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... |  |  Malware: Fighting Malicious CodeIgnoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy... |
|
| Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |