Home | Amazing | Today | Tags | Publishers | Years | Search 
The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

OpenGL(R) Programming on Mac OS(R) X: Architecture, Performance, and Integration
OpenGL(R) Programming on Mac OS(R) X: Architecture, Performance, and Integration
The Mac has fully embraced OpenGL throughout its visual systems. In fact, Apple's highly efficient, modern OpenGL implementation makes Mac OS X one of today's best platforms for OpenGL development. OpenGL® Programming on Mac OS® X is the first comprehensive resource for every graphics...
The New School of Information Security
The New School of Information Security
“It is about time that a book like The New School came along. The age of security as pure technology is long past, and modern practitioners need to understand the social and cognitive aspects of security if they are to be successful. Shostack and Stewart teach readers exactly what they need to know--I just wish I could...
Cocoa(R) Programming for Mac(R) OS X (3rd Edition)
Cocoa(R) Programming for Mac(R) OS X (3rd Edition)
The best-selling introduction to Cocoa, once again updated to cover the latest Mac programming technologies, and still enthusiastically recommended by experienced Mac OS X developers.

 

“Aaron’s book is the gold standard for Mac OS X...

XML and Java: Developing Web Applications
XML and Java: Developing Web Applications

XML and Java: Developing Web Applications is a tutorial that will teach Web developers, programmers, and system engineers how to create robust XML business applications for the Internet using the Java technology. The authors, a team of IBM XML experts, introduce the essentials of XML and Java development, from a review of basic concepts to...

iSCSI: The Universal Storage Connection
iSCSI: The Universal Storage Connection
iSCSI: The Universal Storage Connection is an informative overview and in-depth guide to the emerging iSCSI standard, the technology that enables data storage, access, and management over networks, intranets, and the Internet. The iSCSI protocol reduces the total cost of ownership of shared storage solutions and enables an...
Designing Enterprise Applications with the Java(TM) 2 Platform (Enterprise Edition)
Designing Enterprise Applications with the Java(TM) 2 Platform (Enterprise Edition)

The Java 2 Platform, Enterprise Edition, offers enterprise developers a simplified, component-based approach to creating applications for both intranets and the Internet.

Created by the Enterprise Team of the Java Software group at Sun Microsystems, Designing Enterprise Applications with the Java™ 2 Platform, Enterprise Edition...

The Software Project Manager's Bridge to Agility (The Agile Software Development Series)
The Software Project Manager's Bridge to Agility (The Agile Software Development Series)
When software development teams move to agile methods, experienced project managers often struggle—doubtful about the new approach and uncertain about their new roles and responsibilities. In this book, two long-time certified Project Management Professionals (PMPRs) and Scrum trainers have built a bridge to this dynamic new...
Geekonomics: The Real Cost of Insecure Software
Geekonomics: The Real Cost of Insecure Software
You may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The...
Fuzzing: Brute Force Vulnerability Discovery
Fuzzing: Brute Force Vulnerability Discovery
The concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered...
Algorithmics: The Spirit of Computing (3rd Edition)
Algorithmics: The Spirit of Computing (3rd Edition)
From a review of the first edition:

‘This book is a veritable tour de force. Harel writes with uncommon verve, clarity and imagination.'

‘Through the use of tantalizing questions and aptly chosen and often amusing examples, the author transmits to the reader the excitement and intellectual satisfaction of computer science...

Essential Windows Communication Foundation (WCF): For .NET Framework 3.5 (Microsoft .NET Development Series)
Essential Windows Communication Foundation (WCF): For .NET Framework 3.5 (Microsoft .NET Development Series)
“Whether this is the first time or the fifty-first time you’re using WCF, you’ll learn something new by reading this book.”

 --Nicholas Allen, Program Manager, Web Services, Microsoft

 

Windows Communication Foundation (WCF) is the...

Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy