Listing 1 - 2 of 2 |
Sort by
|
Choose an application
The Microsoft .NET initiative is the future of e-commerce - making it possible for organisations to build a secure, reliable e-commerce infrastructure. This is the first book to outline the capabilities of SQL Server 2000, one of the key components of .NET. SQL Server 2000 introduces powerful new data mining functionality designed specifically to capture and process customer profiles and to predict future buying patterns on e-commerce sites. Designing SQL Server 2000 Databases for NET Enterprise Servers addresses the needs of IT professionals migrating from the popular SQL 7 databases to the new SQL 2000, as well as those who are starting from scratch. * Covers all key features of SQL Server 2000 including; XML support, enhanced data-mining capabilities and integration with Windows 2000 * While there are many books available on SQL 7 - this is the first to be announced for SQL 2000 * Free ongoing customer support and information upgrades. Are you tired of feeling vulnerable to the latest security vulnerabilities? Are you fed up with vendors who take too long to release security patches, while criminals waste no time in exploiting those very same holes? Do you want to know who, exactly, is really trying to hack your network? Do you think EVERYONE should be responsible for securing their owns systems so they can't be used to attack yours? Do you think you have the right to defend yourself, your network, and ultimately your business against aggressors and adversaries? If so, Aggressive Network Self-Defense is the book for you. Le.
Choose an application
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed desc
Computer security. --- Computer hackers. --- Information Technology --- General and Others --- Computer hackers --- Computer programmers --- Computer users --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Listing 1 - 2 of 2 |
Sort by
|