Prev 10 articles | Next 10 articles
An end-to-end guide to securing Apache Web servers and Web applications
Read More
IDTechEx has researched the RFID industry to bring new forecasts for the years ahead. Cumulative sales of RFID tags for sixty years until the beginning of 2006 totalled 2.4 billion, with 600 million tags being sold in 2005 alone. In 2006, IDTechEx expect 1.3 billion tags to be sold. Of that about 500 million RFID smart labels will be used for pallet and case level tagging but the majority will be used for a range of diverse markets from baggage and passports to contactless payment cards and drugs.
Read More
With a constantly changing business environment, converting risks into positive organizational advantages make risk a strategic issue that requires a process of careful planning, implementation and management from all levels called risk management. Relevant to all organizations whether they are in the public or private sector, risk management helps the organization confirm its compliance with corporate governance requirements.
Read More
O'Reilly publishes
Applied Software Project Management.
Read More
O'Reilly Releases "Essential PHP Security"
Read More
O'Reilly Releases "Mac OS X Tiger in a Nutshell"
Read More
O'Reilly has released "Understanding the Linux Kernel, Third Edition".
Read More
There are a lot of network tasks that developers may have on their wish lists for projects, but never seriously consider because of the amount of work involved to pull them off - tasks such as giving an application an embedded SSH server for administration, or writing a custom IMAP server. New O'Reilly book comes to the assistance.
Read More
When the original "Open Sources: Voices from the Revolution" was published in 1999, Eric. S. Raymond noted that the Internet "has even brought hacker culture to the beginnings of mainstream respectability and clout." A half-decade later, open source has grown far beyond the mainstream, observes Kim Polese, CEO of SpikeSource, in her foreword to "Open Sources 2.0". "It has become the bedrock over which the mainstream flows. Today it is hard to find a Fortune 500 company with an IT infrastructure that does not depend, in some fundamental way, on open source software."
Read More
It's a hotbed of fraud, spammers, and identity theft, but, undaunted, we spend more and more of our time (and money) on the Internet. Few of us consider the "threats" it proffers to be more than a nuisance, forgetting that there's real criminal intent behind them targeting some of the most vulnerable members of our society. We overlook the content in spam messages because we already know them to be scams. But, while we would never click on a link in an email to update our password and social security number for a bank account, many people do.
Read More
Prev 10 articles | Next 10 articles