Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Provides a concise system for managing IT projects, regardless of the size or complexity of the project. This work offers a fresh approach to IT project management, combining strategic business concepts with the practical instructions for developing and managing a successful IT project.
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This book offers a look at the SonicWALL firewall product line. It covers various aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls.
A guide to Ruby, a popular Object-Oriented Programming Language. It is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. It helps readers learn how to develop, implement, organize and deploy applications using Ruby.
A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
Offers hard-core gamers specific instructions on how to crack into their console and make it do things it was never designed to do. This book provides a guide to hacking popular video gaming consoles.
A road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features, the book is organized around the 11 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. It explains the options within each menu, and identifies the potential problems.
The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in metropolitan area worldwide.
Lego Mindstorms lets you design and program robots that can do just about anything. This illustrated title provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies. It is specifically targeted at new users of the Lego Mindstorms RIS 2.0.
Provides information on Microsoft's log parser tool. This book contains several customized, working scripts and templates useful for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. It teaches readers how the various queries within Log Parser work, and more.
Offers a technically explicit expose of the inner workings of the SPAM economy.
Includes coverage of the additions to the PIX Firewall family, including the CiscoSecure PIX Firewall (PIX) Software Release 6.0. This guide instructs the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting, and more.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.