Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Application Development For The Enterprise (Programming Series)

Buy
The Linux operating system is not limited to just game or open source programming, but can be used to build the same applications as in any other commercial UNIX environment. This book provides information, techniques, and source code for developing commercial-grade applications on the Linux operating system. Backed by industry leaders like IBM, Oracle, Sun Microsystems, and Borland, Linux is also the only operating system that runs on a wide range of computers. It is compatible with laptops, desktops, mid-range servers, and mainframe computers, making the operating system suitable for both server and client machines.
(HTML tags aren't allowed.)

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure....
Microsoft Visual Basic 2008 Step by Step
Microsoft Visual Basic 2008 Step by Step
Teach yourself the fundamentals of working with Visual Basic 2008 one step at a time. With STEP BY STEP, you work at your own pace through hands-on, learn-by-doing exercises. Whether you re a beginning programmer or new to this specific language, you ll understand the core capabilities and fundamental techniques for Visual Basic 2008 and rapidly...
Critical Thinking for Managers: Structured Decision-Making and Persuasion in Business (Management for Professionals)
Critical Thinking for Managers: Structured Decision-Making and Persuasion in Business (Management for Professionals)

This book discusses critical thinking as a tool for more compassionate leadership, presenting tried and tested methods for managing disagreement, for anticipating and solving problems, and for enhancing empathy. Employing a lighter tone of voice than most management books, it also shows how and when less-than-rational mechanisms such...


Introduction To Data Networks, Pdn, Lan, Man, Wan, And Wireless Data, Technologies And Systems
Introduction To Data Networks, Pdn, Lan, Man, Wan, And Wireless Data, Technologies And Systems

This book explains the different types of data networks, how the key types of data networks operate, and the different types of data services they provide. Data networks have become a fundamental part of almost all communication networks. Data networks are telecommunications networks that are installed and operated for information exchange...

Beginning Windows Phone 7 Development
Beginning Windows Phone 7 Development

This is the second edition of this book. We wanted to improve upon the first edition and become the market leader in providing practical knowledge on the fast-coming, latest-and-greatest technology of Windows Phone.

While this second edition was being written, Microsoft and Nokia formally announced their partnership and...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy