Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Basic Statistics Using SAS Enterprise Guide: A Primer
Basic Statistics Using SAS Enterprise Guide: A Primer

Now it's easy to perform many of the most common statistical techniques when you use the SAS Enterprise Guide point-and-click interface to access the power of SAS. Emphasizing the practical aspects of the analysis, this example-rich guide shows you how to conduct a wide range of statistical analyses without any SAS programming required. One or...

Beginning Joomla!, Second Edition (Beginning from Novice to Professional)
Beginning Joomla!, Second Edition (Beginning from Novice to Professional)
Joomla!, exclamation point and all, is one of the most searched–for and hired–for open source content management systems in the world. Since 2007, the combination of Joomla! and Dan Rahmel’s bestselling Beginning Joomla!, From Novice to Professional have made it so that all you have to do is read a single...
Ubuntu on a Dime: The Path to Low-Cost Computing (Path to Low Cost Computing)
Ubuntu on a Dime: The Path to Low-Cost Computing (Path to Low Cost Computing)
You know that Ubuntu software costs nothing. Now you want the PC system that costs as little as possible and runs Ubuntu and OS applications without complaints and calls to tech support.

So you spend your hard–earned dollars on the hardware only and have your own optimized Ubuntu PC. This is the book that will show you how to get what you...

Mathematica Cookbook
Mathematica Cookbook

Mathematica Cookbook helps you master the application's core principles by walking you through real-world problems. Ideal for browsing, this book includes recipes for working with numerics, data structures, algebraic equations, calculus, and statistics. You'll also venture into exotic territory with recipes for data...

Introduction to Search with Sphinx: From installation to relevance tuning
Introduction to Search with Sphinx: From installation to relevance tuning

I can’t quite believe it, but just 10 years ago there was no Google.

Other web search engines were around back then, such as AltaVista, HotBot, Inktomi, and AllTheWeb, among others. So the stunningly swift ascendance of Google can settle in my mind, given some effort. But what’s even more unbelievable is that...

My iPad 2 (covers iOS 5) (3rd Edition)
My iPad 2 (covers iOS 5) (3rd Edition)

The iPad is a unique and totally revolutionary device in many ways. The iPad is a tablet computer featuring multi-touch interaction with print, video, photo, and audio multimedia, internet browsing, and runs most iPhone OS apps. The device has an LED-backlit 9.7-inch (25 cm) color LCD display and uses a virtual keyboard...

Reliability Engineering: Theory and Practice
Reliability Engineering: Theory and Practice

This book shows how to build in, evaluate, and demonstrate reliability and availability of components, equipment, systems. It presents the state-of-the-art of reliability engineering, both in theory and practice, and is based on the author's more than 30 years experience in this field, half in industry and half as Professor of Reliability...

Oracle Database Transactions and Locking Revealed
Oracle Database Transactions and Locking Revealed

Oracle Database Transactions and Locking Revealed provides much-needed information for building scalable, high-concurrency applications and deploy them against the Oracle Database. Read this short, 150-page book that is adapted from Expert Oracle Database Architecture to gain a solid and accurate understanding of how locking...

Mastering VMware vSphere Storage
Mastering VMware vSphere Storage

Monitor and optimize the storage capabilities of your vSphere environment

About This Book

  • Design a storage solution for your vSphere environment
  • Troubleshoot vSphere Storage performance problems
  • An advanced guide to vSphere Storage performance along with best practices to...
The Packaging Designer's Book of Patterns
The Packaging Designer's Book of Patterns

For more than two decades, The Packaging Designer's Book of Patterns has served as an indispensable source of ideas and practical solutions for a wide range of packaging design challenges.

This Fourth Edition offers more than 600 patterns and structural designs—more than any other book—all drawn to...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

unlimited object storage image
Result Page: 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy