|
|
|
|
|
|
Nessus Network Auditing, Second EditionIn the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
... | | eBoot Camp: Proven Internet Marketing Techniques to Grow Your BusinessIn this Web 2.0 era, small business owners are at a severe disadvantage because they have minimal, if any, knowledge, about Internet marketing. They also lack the budget to hire a top-notch web marketer. As a result, the thrust of their Internet marketing program is usually a poorly performing website that attracts few visitors. e Boot Camp is the... | | Colonial Terror: Torture and State Violence in Colonial India
Focusing on India between the early nineteenth century and the First World War, Colonial Terror explores the centrality of the torture of Indian bodies to the law-preserving violence of colonial rule and some of the ways in which extraordinary violence was embedded in the ordinary operation of
colonial states. Although ... |
|
| | Planning Extreme Programming
The hallmarks of Extreme Programming--constant integration and automated testing, frequent small releases that incorporate continual customer feedback, and a teamwork approach--make it an exceptionally flexible and effective approach to software development. Once considered radical, Extreme Programming (XP) is rapidly becoming ... | | Daring Missions of World War IIFew World War II stories are more gripping than those fought behind enemy lines by spies, underground members, and special forces.
In his latest collection, Daring Missions of World War II, popular author and distinguished historian William Breuer brings to light largely unknown stories of behind-the-scenes bravery and covert... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |