Home | Amazing | Today | Tags | Publishers | Years | Search 
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Oracle Database 10g OCP Certification All-In-One Exam Guide (Oracle Database 10g Handbook)
Oracle Database 10g OCP Certification All-In-One Exam Guide (Oracle Database 10g Handbook)

The Most Authoritative OCA/OCP Exam Guide Available

Prepare to pass the OCA and OCP Oracle Database 10g certification exams with help from this Oracle Press guide. With complete coverage of all the material on Exam #1Z0-042 Oracle Database 10g: Administration I and Exam #1Z0-043 Oracle Database 10g: Administration II, this book covers...

Applied C# in Financial Markets (The Wiley Finance Series)
Applied C# in Financial Markets (The Wiley Finance Series)
This book is designed to help experienced programmers into the C# language.
It covers all the relevant concepts of C# from a finance viewpoint.

In the preparation of this book a small standalone futures and options
trading application was written to cover all of the sections of C# that are
relevant to finance and the code
...
Apple Training Series: Mac OS X v10.4 System Administration Reference, Volume 2
Apple Training Series: Mac OS X v10.4 System Administration Reference, Volume 2

Focusing specifically on Account Management and Deploying Mac OS X Server, this comprehensive reference provides in-depth information on Mac OS X Server's technical architecture. System administrators, IT professionals, and Mac enthusiasts will learn the details of how to deploy Mac OS X Server within a multiplatform,...

Crystal Reports(R) 9: The Complete Reference
Crystal Reports(R) 9: The Complete Reference

Your Definitive Resource on Crystal Reports 9!

Covers upgraded GUI, custom functions, repository, Report Application Server, and more

Create eye-popping, presentation-quality reports and complex, interactive analysis documents both on and off the Web with help from this one-stop reference. Learn to use the latest version of this...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Mac OS X Advanced Development Techniques
Mac OS X Advanced Development Techniques

Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.

The book concentrates on teaching Cocoa development first, and then takes that knowledge and...

Inside Delphi 2006 (Wordware Delphi Developer's Library)
Inside Delphi 2006 (Wordware Delphi Developer's Library)

Now in its 10th version, Delphi provides users with four programming languages: C++ and Delphi for Win32 for building Windows applications, and C# and Delphi for .NET for building applications that target the .NET platform. Inside Delphi 2006 demonstrates how to use all of these languages. Topics include the foundations of Delphi, VCL...

Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Hit the ground running with the detailed, road-tested deployment scenarios featured in Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed. Written by best-selling authors Michael Noel, who has been involved with the early beta of ISA Server 2004, and ...
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
C# Primer Plus
C# Primer Plus

C# Primer Plus teaches the C# programming language and relevant parts of the .NET platform from the ground up, walking you through the basics of object-oriented programming, important programming techniques and problem solving while providing a thorough coverage of C#'s essential elements - such as classes, objects, data types, loops, branching...

Result Page: 303 302 301 300 299 298 297 296 295 294 293 292 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy