|
|
|
|
|
|
Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Fully updated for today's key threats, tools, and solutions, this book shows you how hackers... | | The Alignment Effect: How to Get Real Business Value Out of TechnologyThe Alignment Effect offers managers a systematic blueprint for demanding real accountability and bottom-line business results from their IT investments. Using actual case studies, Faisal Hoque introduces Business Technology Management, a comprehensive approach to aligning technology with business objectives,... | | C Pocket Reference
C is one of the oldest programming languages and still one of the most widely used. Whether you're an experienced C programmer or you're new to the language, you know how frustrating it can be to hunt through hundreds of pages in your reference books to find that bit of information on a certain function, type or other syntax element.... |
|
Cryptography: A Very Short IntroductionWe are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.
In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight... | | Microsoft Windows 2000 Server Administrator's Companion, Second EditionWhen the first edition of this book was published in 2000 coinciding with the release of the Microsoft Windows 2000 family of operating systems, we were extremely gratified by the positive reception from network administrators and others interested in Windows 2000 Server. We're very proud of the book and think it's a worthwhile resource for... | | Hack Proofing Your Wireless NetworkWhen the concept of a network without wires was first suggested more than two decades ago, it sparked the imagination of scientists, product vendors, and users around the globe eager for the convenience and flexibility of a free roaming connection. Unfortunately, as the variety of wireless solutions began to emerge, anticipation ... |
|
|
Result Page: Previous 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Next |