Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Running Linux, Fourth Edition
Running Linux, Fourth Edition
This is a book about Linux, a free, open source operating system that's changing the world of
computing. In this book, we show how you can completely change the way you work with
computers by exploring a powerful and free operating system. Linux goes against
the traditional computing mainstream, being developed by a loosely organized
...
Mining the Web: Analysis of Hypertext and Semi Structured Data (The Morgan Kaufmann Series in Data Management Systems)
Mining the Web: Analysis of Hypertext and Semi Structured Data (The Morgan Kaufmann Series in Data Management Systems)
Mining the Web: Discovering Knowledge from Hypertext Data is the first book devoted entirely to techniques for extracting and producing knowledge from the vast body of unstructured Web data. Building on an initial survey of infrastructural issuesincluding Web crawling and indexingChakrabarti examines machine learning techniques as...
Java Development with Ant
Java Development with Ant
This book is about Ant, the award-winning Java build tool. Ant has become the centerpiece of so many projects’ build processes because it is easy to use, is platform independent, and addresses the needs of today’s projects to automate testing and deployment. From its beginnings as a helper application to compile Tomcat, Sun’s (now...
Java 2 Core Language Little Black Book
Java 2 Core Language Little Black Book
The Java 2 Core Language Little Black Book is a compact, detailed reference for intermediate to experienced programmers and managers who are ready to learn how to build Java programs. The book features a logical, sequential approach with concise overviews and step-by-step, ready-to-use solutions created by a master Java programmer. This book is...
Java Enterprise Best Practices
Java Enterprise Best Practices
Until Java Enterprise Best Practices, advanced Java developers relied on the advice of a loose-knit community of fellow developers, time-consuming online searches for examples or suggestions for the immediate problem they faced, and tedious trial-and-error. But Java has grown to include a huge number of APIs,...
Scheduling in Real-Time Systems
Scheduling in Real-Time Systems
Real-time computing plays a vital role in ultra-reliable and safety-critical applications in fields as diverse as flight control, telecommunication systems, nuclear plant supervision and surgical operation monitoring. Providing a comprehensive overview, this book examines the most significant real-time scheduling policies in use today....
The Career Programmer: Guerilla Tactics for an Imperfect World
The Career Programmer: Guerilla Tactics for an Imperfect World

See what reviewers at Slashdot.org have to say about this book!

  • Conquer the problems that all professional programmers routinely face, regardless of language, operating system, or platform
  • Improve your ability to deliver solid code, on time and under budget, in even the most uncooperative...
Electrical Engineer's Reference Book, Sixteenth Edition
Electrical Engineer's Reference Book, Sixteenth Edition

For ease of use, this edition has been divided into the following subject sections: general principles; materials and processes; control, power electronics and drives; environment; power generation; transmission and distribution; power systems; sectors of electricity use.

New chapters and major revisions include: industrial
...

Handbook of Autopsy Practice
Handbook of Autopsy Practice

In Handbook of Autopsy Practice, Third Edition, Jurgen Ludwig, MD, has painstakingly updated and expanded his recognized "masterpiece" to create an indispensable and invaluable source of classic and innovative procedures for successful autopsy diagnosis and documentation. The section on autopsy methods has been modernized with...

Microsoft Access Version 2002 Inside Out
Microsoft Access Version 2002 Inside Out

Whether you’re a new user of Microsoft Access or an experienced Access database developer, you’ll find a number of solid improvements in Access 2002. With an eye toward enhancements both in form and function, the changes in Access make working with the interface more intuitive than ever; extend the reach of your data by giving...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
unlimited object storage image
Result Page: Previous 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy