 |
|
|
|
 Windows .NET Server 2003 RegistryProvides a historical overview of the Registry and outlines the differences between Windows 9x/ME and Windows NT/2000/XP/.NET Registries.
Enabling system, network, and security administrators to master Registry concepts and architecture, this book provides a historical overview of the Registry and outlines the differences... |  |  Current Security Management & Ethical Issues of Information TechnologyThis scholarly examination of the ethical issues in information technology management covers basic details such as improving user education and developing security requirements as well as more complicated and far-reaching problems.
Corporate and individual behaviors are increasingly publicized as reports of scandals around the world are... |  |  Hacker Disassembling UncoveredThis text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
This book is dedicated to the basics of hacking—methods of analyzing programs using a... |
|
 ADO.NET in a NutshellADO.NET in a Nutshell is the most complete and concise source of ADO.NET information available. Besides being a valuable reference, this book covers a variety of issues that programmers face when developing web applications or web services that rely on database access. Most examples use Microsoft's C# language. The... |  |  Content Syndication with RSSOriginally developed by Netscape in 1999, RSS (which can stand for RDF Site Summary, Rich Site Summary, or Really Simple Syndication) is an XML-based format that allows web developers to describe and syndicate web site content. Content Syndication with RSS offers webloggers, developers, and the programmers who... |  |  Stealing the Network: How to Own the BoxStealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real.While none of these specific events have happened, there is no reason why they could not.You could argue it provides a roadmap for criminal hackers, but I say it does something... |
|
Result Page: Previous 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 Next |