Computers

Best Selling / Page 264

icon Subscribe to feed

Browse

Best Selling

New Releases

Our selection

Awards

 

Category

Delete Computers

 

In category

Programming (2032)

Personal Computing (1259)

Web (1107)

Graphism (679)

Database (640)

Enterprise software and computing (585)

System Administration (364)

Audio, Vidéo (354)

Hardware and devices (325)

Network and Telecommunications (76)

Computer Architecture (54)

Theory (2)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (8193)

French (31)

German (66)

Spanish (112)

Italian (82)

 

Protection

All (9644)

DRM Free (1451)

DRM (8193)

More options

SQL Injection Attacks and Defense

by Justin Clarke

Winner of the Best Book Bejtlich Read in 2009 award!

"SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/...


Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity

by Jesse Varsalone & Dale Liu

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as...


Seven Deadliest Microsoft Attacks

by Rob Kraus, Mike Borkin & Brian Barber

Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the...


Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7

by Jorge Orchilles

Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades. This reference explains how to deploy, use, and...


Seven Deadliest Web Application Attacks

by Mike Shema

Seven Deadliest Wireless Technologies Attacks draws attention to the vagaries of Web security by discussing the seven deadliest vulnerabilities exploited by attackers. Each chapter presents examples of different...


Seven Deadliest Network Attacks

by Stacy Prowell, Rob Kraus & Mike Borkin

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the...


Seven Deadliest Wireless Technologies Attacks

by Brad Haines

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the different attacks against popular wireless protocols and systems. Each chapter includes an example real attack scenario; an...


Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks

by Jeff Smith, Jake Woodhams & Robert Marg

Controller-Based Wireless LAN Fundamentals

An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks

 

As wired networks are increasingly replaced with 802.11n wireless connections,...


OS X Mountain Lion for Dummies

by Bob LeVitus

Tame your Mountain Lion, the "Dr. Mac" way

Author Bob "Dr. Mac" LeVitus is a Mac guru and one of the world's leading authorities on all things Apple, so when he talks OS X Mountain Lion, people listen. Now you...


Mastering Autodesk Revit Mep 2013

by Don Bokmiller, Plamen Hristov & Simon Whitbread

An outstanding tutorial and reference for Autodesk Revit MEP

This Autodesk Official Training Guide is the detailed reference and tutorial you need to master the powerful Autodesk Revit MEP 2013 building information...


Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol

by Henry Sinnreich & Alan B. Johnston

"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."

--Henning Schulzrinne, Professor, Columbia University...


Autodesk 3ds Max 2013 Bible

by Kelly L. Murdock

Updated version of the bestselling 3ds Max book on the market

Autodesk 3ds Max is top animation software used by developers, visual effects artists, and graphic designers in film, television, and the game industry....


Publishing E-Books For Dummies

by Ali Luke

Publish, market, and sell your own e-book Although creating an e-book seems fairly straightforward, it is not. You need to select and create a variety of formats that will be read on a variety of e-reader devices--and...


Visual Basic 2012 Programmer's Reference

by Rod Stephens

The comprehensive guide to Visual Basic 2012

Microsoft Visual Basic (VB) is the most popular programming language in the world, with millions of lines of code used in businesses and applications of all types...


Professional Mobile Application Development

by Jeff McWherter & Scott Gowell

Create applications for all major smartphone platforms

Creating applications for the myriad versions and varieties of mobile phone platforms on the market can be daunting to even the most seasoned developer....


Teach Yourself Visually OS X Mountain Lion

by Paul McFedries

Get to know the new cat in the pride-Mac OS X Mountain Lion-with this VISUAL guide

Apple's new Mac OS X Mountain Lion is impressive, with features and functions that will be familiar to Mac users from their...


Mobile Video with Mobile Ipv6

by Daniel Minoli

Increased reliance on mobile devices and streaming of video content are two of the most recent changes that have led those in the video distribution industry to be concerned about the shifting or erosion of...


Mastering Autodesk Navisworks 2013

by Jason Dodds & Scott Johnson

The only book on Autodesk's popular and powerful architectural project collaboration software

This Autodesk Official Training Guide is the perfect detailed reference and tutorial for the powerful Navisworks...


Energy Efficient Distributed Computing Systems

by Albert Y. Zomaya & Young-Choon Lee

The energy consumption issue in distributed computing systems raises various monetary, environmental and system performance concerns. Electricity consumption in the US doubled from 2000 to 2005.  From a financial...


IOS Hacker's Handbook

by Charlie Miller, Dion Blazakis & Dino DaiZovi

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have...