|
|
| | |
|
Mastering Delphi 6 Marco Cantu
--This update of our award-winning book is a must for every Delphi programmer. --Includes all updated applications, plus an in-depth discussion of COM, Corba, and ActiveX. --Excellent for all levels of Delphi knowledge; beginner to experienced programmer. Learn to stretch Delphi to the limit!...
| |
| | |
| | |
|
Security Sage's Guide to Hardening the Network Infrastructure Erik Pace Birkholz, Brian Kenyon, Steven Andre
Security Sage's Guide to Hardening the Network Infrastructure will be the only publication that provides security and Information Technology (IT) professionals an in-depth and comprehensive view of network devices, protocols and architectures. It provides detailed guidance on real-world network threats and exposures. While most network security books focus on ancillary topics, such as operating systems, RDBMS, groupware, and other applications, this book will concentrate strictly on the nuts and bolts of networks, such as routers, firewalls, Intrusion Detection Systems (IDS) and the networking protocols that work in congress with them. It has over 200 pages dedicated to the most up-to-date network layer attacks and mitigation techniques across an wide assortment of vendors and not just the typical attention paid to market leaders such as Cisco and Checkpoint. This expanded breadth will help reach a wider range of network engineers who may not have the budget to purchase and install......
| |
| | |
| | |
|
Web Services Security Mark O'Neill
Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You’ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more....
| |
| | |
| | |
|
Honeypots for Windows Roger A. Grimes
If you're a developer who's tired of reading Unix and Linux documentation and newsgroup letters to get information on building and maintaining a Windows-based Honeypot, then this book is for you. No longer will you have to rummage through Unix-only advice and utilities to extract information relevant to your Windows deployment. This insightful guide will teach you special tricks and provide troubleshooting tips to help you efficiently run and maintain a Windows-based Honeypot. Honeypots forWindows covers installing, configuring, and maintaining security Honeypots on Windows platforms. This reference also discusses the popular open source Honeypot product "honeyd" and summarizes other commercial Honeypot solutions....
| |
| | |
| | |
|
Охота с биноклем. Ревизские сказки Михаил Подгородников
Возвращение. Держащий удар, Государственные люди, Государственные люди, Эмигрантская коллекция, Литературный свет, или Семерка бьет туза, Сны и явь, Сатурново кольцо, Сойдет и так…, Десятилетка особняков и ее затеи, Облава, Встречи, Осторожно - листопад!, Не успел, Братья, Стукачи и слухачи, Не смешите меня - деньги должны быть завтра, Государство - это я!, Добровольно прикованный, Социализм умер. Да здравствует социализм!. "Ревизские сказки" - так в старину называли опись населения. Гоголевский Чичиков перебирал списки купленных им душ, и его воображение невольно продолжало жизнь тех, кто был намертво занумерован на бумаге. Автор данной книги не слишком предавался мечтаниям: он записывал обычные истории обычных людей. Но между ними попадались судьбы странные, почти сказочные, но - вполне закономерные....
| |
| | |
| |
На главную
Mastering Delphi 6. Marco Cantu . Книги.
Абакан, Архангельск, Сыктывкар, Электросталь, Новосибирск, Междуреченск, Барнаул, Ковров, Йошкар-Ола, Абакан, СергиевПосад, Краснодар, Волгоград, Новомосковск, Батайск, Бийск, Москв, Тюмень, Шахты, Иркутск, Хасавюрт, Новороссийск,
Банковское дело| Люди шоу-бизнеса| Обществознание| Современные драмы|
интернет магазин книги, купить аудиокнигу, book, audio books, самоучитель игры, техническая литература, |