Este autor profundiza en los complejos antecedentes políticos y militares de eventos históricos cruciales, centrándose en ofrecer nuevas perspectivas. Su obra se caracteriza por un profundo examen del pasado, con el objetivo de brindar a los lectores una comprensión renovada. Se pone énfasis en la investigación y el análisis meticulosos para iluminar aspectos a menudo pasados por alto de los conflictos históricos. El objetivo es hacer accesibles los temas históricos a través de una perspicaz exploración literaria.
Presents twenty-four lessons on developing applications for the iPhone and iPad, and includes information on navigating the development environment, building advanced user interfaces, and integrating online services.
A Hacker's Guide to Protecting Your Linux Server and Workstation - Second Edition
870 páginas
31 horas de lectura
Given the subtitle, A hacker's guide to protecting your Linux server and workstation, it is hardly surprising that the author remains anonymous except for the fact that he is a California computer criminal turned security consultant. He covers Linux security basics; and user, network, and Internet security. Appendices include specifics on Linux and Unix security utilities and applications. The CD-ROM features Linux security tools. No date is given for the first edition. Ray is also a security consultant. Annotation c. Book News, Inc., Portland, OR (booknews.com)