Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
LDAP Programming with Java(TM)

Buy
LDAP Programming with Java(TM), 9780201657586 (0201657589), Addison Wesley, 2000
In this book we’ve provided a very large number of examples for every aspect of
programming with Directory SDK for Java, from simple code snippets to more than
two dozen complete components and applications. You may be able to use some of
them as starting points for your own projects.

We do not discuss directory deployment scenarios or how to configure an LDAP
server. Such topics are explored in detail in other books and in documentation provided
by vendors of LDAP servers.
(HTML tags aren't allowed.)

SSH, the Secure Shell: The Definitive Guide
SSH, the Secure Shell: The Definitive Guide
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every...
Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Wireless Hacks
Wireless Hacks

The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.

...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Numerical Methods in Engineering with Python
Numerical Methods in Engineering with Python

Numerical Methods in Engineering with Python, 2nd Edition is a text for engineering students and a reference for practicing engineers, especially those who wish to explore Python. This new edition features 18 additional exercises and the addition of rational function interpolation. Brent's method of root finding was replaced by...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy