|
|
|
|
| | Real World Linux Security (2nd Edition)
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or... | | JavaScript Application CookbookSeasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.
The cookbook begins with... |
|
eDirectory Field GuideeDirectory Field Guide is a handy reference for configuring, troubleshooting, and optimizing Novells eDirectory on NetWare, Linux, Unix, and Windows. Along with Sun ONE Directory Server and Microsoft Active Directory, Novells eDirectory is a leader in directory server software, the specialized database that enterprises employ to store... | | Zen and the Art of Information SecurityWhile security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable... | | MySpace Unraveled: What it is and how to use it safelyDo you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech... |
|
Enabling Technologies for Mobile Services: The MobiLife BookThis book’s emphasis is on describing a complete architectural framework, which combines theory and practice in a way that gives a realistic view of the opportunities and challenges in the applications and services area, including results from both extensive user evaluations and technical evaluations. It will cover topics in the B3G area that... | | | | |
|
Machine Translation: Its Scope and LimitsMachine Translation (MT) is both an engineering technology and a measure of all things to do with languages and computers—whenever a new theory of language or linguistics is offered, an important criteria for its success is whether or not it will improve machine translation.
This book presents a history of machine translation (MT) from... | | The Man Who Loved Only NumbersAn affectionate if impressionistic portrayal of one of the century's greatest and strangest mathematicians. Though little known among nonmathematicians, Erdos, who died in 1996 at age 83, was a legend among his colleagues. According to Hoffman (Archimedes' Revenge, 1988), the Hungarian was so devoted to mathematics that he went without... | | Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable AssetsInside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive... |
|
|
Result Page: 932 931 930 929 928 927 926 925 924 923 922 921 920 919 918 917 916 915 914 |