You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
From bestselling author Liberty comes an entry-level book that presents this young programming language and the basics of object-oriented .NET programming.
The rich, untold origin story of the ubiquitous web cookie—what’s wrong with it, why it’s being retired, and how we can do better. Consent pop-ups continually ask us to download cookies to our computers, but is this all-too-familiar form of privacy protection effective? No, Meg Leta Jones explains in The Character of Consent, rather than promote functionality, privacy, and decentralization, cookie technology has instead made the internet invasive, limited, and clunky. Good thing, then, that the cookie is set for retirement in 2024. In this eye-opening book, Jones tells the little-known story of this broken consent arrangement, tracing it back to the major transnational conflicts around...
None
Covers advanced features of Perl, how the Perl interpreter works, and presents areas of modern computing technology such as networking, user interfaces, persistence, and code generation.
This text is an indispensable compendium for Web content developers. It contains everything you need to create functional cross-platform Web applications.
When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information Assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35 years old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the more recent past, the term Information Warfare ...
The desktop reference to SCO UNIX and Open Desktop, this version of UNIX in a Nutshell shows you what's under the hood of your SCO system. It isn't a scaled-down quick reference of common commands, but a complete reference containing all user, programming, administrations, and networking commands.
This concise guide for experienced programmers and software architects is a complete no-nonsense overview of key elements and programming languages central to all .NET application development
I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as the new crime environment for the 21st century. The book provides an overview of the Internet, its impact on nations, societies, criminals, security officers, and law enforcement professionals, and includes recommended basic, protective measures. I-Way Robbery is written in non-technical terms. It is also an excellent reference for business and government agency managers who must understand their responsibilities as they relate to asset protection - especially those who have on and off ramps connected to the I-Way. Boni and Kovacich start with the...
Packed with information on the latest Web specifications including HTML 4.01, CSS2, DOM Level 2, and Java Script 1.5, this guide also details the latest version of the major browsers.