Computers

Best Selling / Page 239

icon Subscribe to feed

Browse

Best Selling

New Releases

Awards

 

Category

Delete Computers

 

In category

Programming (2316)

Personal Computing (1524)

Web (1308)

Database (788)

Graphism (699)

Enterprise software and computing (619)

Hardware and devices (420)

System Administration (403)

Audio, Vidéo (390)

Computer Architecture (68)

Network and Telecommunications (64)

Theory (2)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (9200)

French (440)

German (66)

Spanish (107)

Italian (520)

 

Protection

All (9200)

DRM Free (1399)

DRM (7801)

More options

UNIX and Linux Forensic Analysis DVD Toolkit

by Chris Pogue, Cory Altheide & Todd Haverkos

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report,...


E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

by Karen A. Schuler

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information...


Netcat Power Tools

by Jan Kanclirz

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol...


Nokia Firewall, VPN, and IPSO Configuration Guide

by Andrew Hay, Keli Hay & Peter Giannoulis

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."...


Disappearing Cryptography: Information Hiding: Steganography & Watermarking

by Peter Wayner

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver...


Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

by John Hoopes

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security...


Embedded Linux Development Using Eclipse

by Doug Abbott

The Eclipse environment solves the problem of having to maintain your own Integrated Development Environment (IDE), which is time consuming and costly. Embedded tools can also be easily integrated into Eclipse....


Securing Citrix XenApp Server in the Enterprise

by Tariq Azad

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and...


FileMaker Pro 10 Bible

by Ray Cologon

FileMaker Pro 10 Bible provides information that grows with you no matter what your level when you start. Topics range from the general (how databases fit into real life and your business needs; comparisons...


Wireless Security: Know It All: Know It All

by Praphul Chandra, Dan Bensky & Tony Bradley

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules...


Zigbee Wireless Networking

by Drew Gislason

ZigBee is a standard based on the IEEE 802.15.4 standard for wireless personal networks. This standard allows for the creation of very lost cost and low power networks - these applications run for years rather...


Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure

by Jack Wiles, Ted Claypoole & Phil Drake

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment,...


Digital Signal Processing: World Class Designs: World Class Designs

by Kenton Williston

All the design and development inspiration and direction an digital engineer needs in one blockbuster book! Kenton Williston, author, columnist, and editor of DSP DesignLine has selected the very best digital...


Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization

by Thomas Olzak, James Sabovik & Jason Boomer

Virtualization technologies help IT organizations in three ways: cost-cutting, ease of administration, and the overall effect of IT on the environment. Virtualization cuts costs by reducing the amount of capital...


No Code Required: Giving Users Tools to Transform the Web

by Allen Cypher, Mira Dontcheva & Tessa Lau

Revolutionary tools are emerging from research labs that enable all computer users to customize and automate their use of the Web without learning how to program. No Code Required takes cutting edge material...


Mobile Malware Attacks and Defense

by Ken Dunham

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware...


Mac OS X Snow Leopard for Dummies

by Bob LeVitus

Mac OS X Snow Leopard is the newest version of the Macintosh operating system, and “Dr. Mac” Bob LeVitus is the ideal expert to introduce you to Snow Leopard. Mac OS X Snow Leopard For Dummies covers all...


Web Application Defender's Cookbook: Battling Hackers and Protecting Users

by Ryan C. Barnett & Jeremiah Grossman

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This...


Implementing SSL / Tls Using Cryptography and Pki

by Joshua Davies

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure...


Technology Scorecards: Aligning It Investments with Business Performance

by Sam Bansal

Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach

First came the dot.com bust, then the IT squeeze. Despite software being the tail that wags the dog in most corporations,...