|
|
|
|
|
|
$30 Music School"Making art your full-time job is a full-time job." If you're ready to take on this job, then you're ready to follow the advice that you'll find inside $30 Music School. Do-it-Yourself recording, distribution, and promotion have made it easier than ever to make a living making music. Learn how to thrive in this new... | | The Internet Encyclopedia, Volume 3The only comprehensive guide to every Internet topic-from ActiveX to XBRL The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents... | | Mastering MySQL 4MySQL has proven it can compete with the big names in database management, such as SQL Server and Oracle, and with MySQL 4 this is truer than ever. Mastering MySQL 4 is your one-stop resource for all the information you need to create, maintain, use, and extend a MySQL database. It’s also essential reading for anyone developing... |
|
Linux Security Cookbookf you run a Linux machine, you must think about security. Consider this story told by Scott, a system administrator we know:
In early 2001, I was asked to build two Linux servers for a client. They just wanted the machines installed and put online. I asked my boss if I should secure them, and he said no, the ... | | Secure Coding: Principles and PracticesDespite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &... | | Hacker Disassembling UncoveredThis text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
This book is dedicated to the basics of hacking—methods of analyzing programs using a... |
|
|
Result Page: Previous 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 Next |