Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Hit the ground running with the detailed, road-tested deployment scenarios featured in Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed. Written by best-selling authors Michael Noel, who has been involved with the early beta of ISA Server 2004, and ...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Mac OS X Advanced Development Techniques
Mac OS X Advanced Development Techniques

Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.

The book concentrates on teaching Cocoa development first, and then takes that knowledge and...

Inside Delphi 2006 (Wordware Delphi Developer's Library)
Inside Delphi 2006 (Wordware Delphi Developer's Library)

Now in its 10th version, Delphi provides users with four programming languages: C++ and Delphi for Win32 for building Windows applications, and C# and Delphi for .NET for building applications that target the .NET platform. Inside Delphi 2006 demonstrates how to use all of these languages. Topics include the foundations of Delphi, VCL...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
C# Primer Plus
C# Primer Plus

C# Primer Plus teaches the C# programming language and relevant parts of the .NET platform from the ground up, walking you through the basics of object-oriented programming, important programming techniques and problem solving while providing a thorough coverage of C#'s essential elements - such as classes, objects, data types, loops, branching...

Show Me Microsoft Office Access 2003
Show Me Microsoft Office Access 2003
Microsoft Office Access 2003 provides powerful new tools with which to manage data, find and retrieve information faster than ever, share information, and integrate solutions with server side products. Access 2003 incorporates some of the latest technologies such as XML and Microsoft SharePoint to extend data exchange over an intranet or the...
Microsoft ASP.NET Setup and Configuration Pocket Reference
Microsoft ASP.NET Setup and Configuration Pocket Reference
This hands-on, one-stop guide delivers the focused, streamlined direction you need to get your Web solutions up and running quickly. Zero in on key ASP.NET configuration details and techniques using quick-reference tables, lists, coding and more.

This pocket-sized reference is the Web application developer’s fast-answers guide to...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Designing Enterprise Applications with Microsoft Visual Basic .NET
Designing Enterprise Applications with Microsoft Visual Basic .NET

Why, you might ask, did I decide to write an entire book about Microsoft Visual Basic .NET and enterprise development? After all, enterprise development usually conjures up pictures of industrial strength computer systems, something Visual Basic has not traditionally been associated with. First of all, Visual Basic .NET is more...

Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical...
Result Page: 303 302 301 300 299 298 297 296 295 294 293 292 291 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy