Home | Amazing | Today | Tags | Publishers | Years | Search 
Using Samba
Using Samba
Samba, the Server Message Block (SMB) server software that makes it relatively easy to integrate Unix or Linux servers into networks of Microsoft Windows workstations, has to date been mostly explained as an afterthought. Most often, it's appeared in the latter chapters of books about Linux. It deserves better, and the authors of Using...
Stealing the Network: How to Own a Shadow
Stealing the Network: How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress
...
Secure Your Network for Free
Secure Your Network for Free
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for
...
Everyday Scripting with Ruby: For Teams, Testers, and You
Everyday Scripting with Ruby: For Teams, Testers, and You
Are you a tester who spends more time manually creating complex test data than using it? A business analyst who seemingly went to college all those years so you can spend your days copying data from reports into spreadsheets? A programmer who can't finish each day's task without having to scan through version control system output, looking for the...
Developer's Guide to Web Application Security
Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

This book defines Web application security, why it should be
...
Advances in Natural Multimodal Dialogue Systems (Text, Speech and Language Technology)
Advances in Natural Multimodal Dialogue Systems (Text, Speech and Language Technology)
The chapters in this book jointly contribute to what we shall call the field of natural and multimodal interactive systems engineering. This is not yet a well-established field of research and commercial development but, rather, an emerging one in all respects. It brings together, in a process that, arguably, was bound to happen, contributors from...
Wardriving & Wireless Penetration Testing
Wardriving & Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.

Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily
...
RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders).

This book is a guide to CompTIA's new RFID+ Security exam and includes the following study elements: Exam objectives covered in a chapter are clearly
...
Designing with Blends: Conceptual Foundations of Human-Computer Interaction and Software Engineering
Designing with Blends: Conceptual Foundations of Human-Computer Interaction and Software Engineering
The evolution of the concept of mind in cognitive science over the past 25 years creates new ways to think about the interaction of people and computers. New ideas about embodiment, metaphor as a fundamental cognitive process, and conceptual integration--a blending of older concepts that gives rise to new, emergent properties--have become...
Artificial General Intelligence (Cognitive Technologies)
Artificial General Intelligence (Cognitive Technologies)

This is the first book on current research on artificial general intelligence (AGI), work explicitly focused on engineering general intelligence – autonomous, self-reflective, self-improving, commonsensical intelligence. Each author explains a specific aspect of AGI in detail in each chapter, while also investigating the common themes in...

Declarative Agent Languages and Technologies IV: 4th International Workshop, DALT 2006
Declarative Agent Languages and Technologies IV: 4th International Workshop, DALT 2006
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Declarative Agent Languages and Technologies, DALT 2006, held in Hakodate, Japan in May 2006 as an associated event of AAMAS 2006, the main international conference on autonomous agents and multi-agent systems.

The 12 revised full papers...

DNA Computing: 12th International Meeting on DNA Computing, DNA12, Seoul, Korea, June 5-9, 2006
DNA Computing: 12th International Meeting on DNA Computing, DNA12, Seoul, Korea, June 5-9, 2006
This book constitutes the thoroughly refereed postproceedings of the 11th International Workshop on DNA Based Computers, DNA11, held in London, ON, Canada, in June 2005.

The 34 revised full papers presented were carefully selected during two rounds of reviewing and improvement from an initial total of 79 submissions. The wide-ranging topics...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy