All the Documentation You Need for Successfully Deploying Exchange Server 2003 Author Barry Gerber shares his extensive real-world experience in easy-to-understand language in this comprehensive guide to Microsoft's messaging and ...
Using research in neurobiology, cognitive science and learning theory, this text loads patterns into your brain in a way that lets you put them to work immediately, makes you better at solving software design problems, and improves your ...
“A near-future layering of East and West, of religion and technology . . . and of love and its loss—all woven into an intriguing tapestry.” —Diana Gabaldon, bestselling author of the Outlander series Winner of the Homer Award for ...
For readers who want to keep the bad guys out of their network, the latest edition of this bestselling book features over 20 all-new hacking challenges to solve.
A guide to computer security discusses how the "blackhat community" uses the Internet for destructive purposes and provides information on how to learn from a "blackhat" attack to protect computer networks.
The 4th Edition of the Perl Pocket Reference is updated for Perl 5.8. The book covers a summary of Perl syntax rules and a complete list of operators and built-in functions.
Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you, step-by-step, how cyber-criminals target vulnerable sites, gain access, steal critical data, and execute ...