Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress best-selling book Ethereal Packet Sniffing.

This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows,
...
Show Me Microsoft Office Outlook 2003
Show Me Microsoft Office Outlook 2003

Microsoft Office Outlook 2003 provides powerful new tools with which to get connected, manage information, and communicate with others. It is the most-changed application in this revision of the Office products, including an entirely new interface as well as improvements in junk mail blocking and security. Outlook 2003 takes advantage of the...

Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices ranging from technicality of systems evolution to managerial aspects of the topic. It includes very contemporary issues such as evolving legacy systems to e-business, applying patterns for reengineering...
How Personal & Internet Security Works (How It Works)
How Personal & Internet Security Works (How It Works)

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft...

Secure Your Network for Free
Secure Your Network for Free
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for
...
CSS: The Definitive Guide, 3rd Edition
CSS: The Definitive Guide, 3rd Edition

CSS: The Definitive Guide, 3rd Edition, provides you with a comprehensive guide to CSS implementation, along with a thorough review of all aspects of CSS 2.1. Updated to cover Internet Explorer 7, Microsoft's vastly improved browser, this new edition includes content on positioning, lists and generated content, table layout, user...

Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems describes methods and techniques for the design of software systemsparticularly reactive software systems that engage in stimulus-response behavior. Such systems, which include information systems, workflow management systems, systems for e-commerce, production control systems, and embedded...
Socially Intelligent Agents - Creating Relationships with Computers and Robots
Socially Intelligent Agents - Creating Relationships with Computers and Robots
The field of Socially Intelligent Agents (SIA) is a fast growing and increasingly important area that comprises highly active research activities and strongly interdisciplinary approaches. Socially Intelligent Agents, edited by Kerstin Dautenhahn, Alan Bond, Lola Canamero and Bruce Edmonds, emerged from the AAAI Symposium "Socially Intelligent...
Computer Science Handbook, Second Edition
Computer Science Handbook, Second Edition

The second edition of this elemental handbook reviews the current state of theory and practice in the field while emphasizing a more practical/applied approach to IT topics such as information management, net-centric computing, and human computer interaction. With a complete revision of its sections on software engineering, architecture, and...

Breakthrough Windows Vista(TM): Find Your Favorite Features and Discover the Possibilities (Bpg)
Breakthrough Windows Vista(TM): Find Your Favorite Features and Discover the Possibilities (Bpg)
Learn how to use the Microsoft Windows Vista features that interest you most with this full-colour guide that gives you the straight scoop. Packed with information in manageable-sized projects, you can jump right in to any topic that interests you. You'll discover everything from how to set up your new operating system, to accessing the Windows...
Introduction to Computing and Programming with Java: A Multimedia Approach
Introduction to Computing and Programming with Java: A Multimedia Approach

This book is intended to introduce computing, including programming, to students with no prior programming experience. One of the lessons from the research on computing education is that one doesn't just "learn to program." One learns to program something [4, 17]. How motivating that...

Creating your MySQL Database: Practical Design Tips and Techniques
Creating your MySQL Database: Practical Design Tips and Techniques
This book is an innovative and essential short guide for everyone on how to structure your data and set-up your MySQL database tables efficiently and easily. If you're creating a dynamic web application using open-source tools, then you're probably going to be setting up a MySQL database. Getting the design of this database right for your...
Result Page: 729 728 727 726 725 724 723 722 721 720 719 718 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy