Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Handbook of Research on Mobile Multimedia
Handbook of Research on Mobile Multimedia
The demand for mobile access to data no matter where the data is stored and where the user happens to be, in addition to the explosive growth of the Internet and the rising popularity of mobile devices, are among the factors that have created a dynamic business environment, where companies are competing to provide customers access to information...
Principles of Data Mining (Adaptive Computation and Machine Learning)
Principles of Data Mining (Adaptive Computation and Machine Learning)

The growing interest in data mining is motivated by a common problem across disciplines: how does one store, access, model, and ultimately describe and understand very large data sets? Historically, different aspects of data mining have been addressed independently by different disciplines. This is the first truly...

Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

.Mac with iWeb, Second Edition (Visual QuickStart Guide)
.Mac with iWeb, Second Edition (Visual QuickStart Guide)
Need to learn what’s new in .Mac fast? Try a Visual QuickStart!

This best-selling reference’s visual format and step-by-step, task-based instructions will have you up and running with .Mac in no time. In this completely updated edition of our best-selling guide to .Mac leading software application expert
...
Mobile Computing Handbook
Mobile Computing Handbook
The debut of small, inexpensive, yet powerful portable computers has coincided with the exponential growth of the Internet, making it possible to access computing resources and information at nearly any location at almost any time. This new trend, mobile computing, is poised to become the main technology driver for a decade to come. There are many...
Relational Databases and Knowledge Bases
Relational Databases and Knowledge Bases
A database management system (DBMS), or simply database system, is characterized by the data model it suports . The first DBMSs, designed in the 1960s, were based on hierarchical or network models and have been viewed as extensions of file systems in which interfile links are provided through pointers . The data manipulation languages of these...
C# 3.0 Unleashed: With the .NET Framework 3.5
C# 3.0 Unleashed: With the .NET Framework 3.5
Whether you need an approachable on-ramp to .NET or you want to enhance your skills, C# 3.0 Unleashed is a comprehensive, in-depth guide to the solutions you seek. You’ll learn to do more with the new tools that are available, including Visual Studio 2008 and the .NET Framework Class Libraries. Throughout this book, you’ll get a...
Encyclopedia of Civil War Shipwrecks
Encyclopedia of Civil War Shipwrecks
On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,...
Enterprise Recipes with Ruby and Rails
Enterprise Recipes with Ruby and Rails
Enterprise Recipes with Ruby and Rails helps you to overcome typical obstacles hidden in every enterprise's infrastructure. It doesn't matter if your Rails application needs to access your company's message-oriented middleware or if it has to scan through tons of huge XML documents to get a missing piece of data. Ruby and Rails enable you...
Excel PivotTables and PivotCharts: Your visual blueprint for creating dynamic spreadsheets
Excel PivotTables and PivotCharts: Your visual blueprint for creating dynamic spreadsheets

Master two of the most powerful features of Excel

Even if you use Excel all the time, you may not be up to speed on two of Excel's most useful features. PivotTable and PivotChart turn long lists of unreadable data into dynamic, easy-to-read tables and charts that highlight the information you need most; you can tweak...

From Russia with Tough Love: Pavel's Kettlebell Workout for a Femme Fatale
From Russia with Tough Love: Pavel's Kettlebell Workout for a Femme Fatale

In Russia, kettlebells have long been revered as the fitness-tool of choice for Olympic athletes, elite special forces and martial artists. The kettlebell’s ballistic movement challenges the body to achieve an unparalleled level of physical conditioning and overall strength.

But until now, the astonishing benefits of the...

unlimited object storage image
Result Page: 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy