Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Network Know-How: An Essential Guide for the Accidental Admin
Network Know-How: An Essential Guide for the Accidental Admin

Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to each other and the Internet? The best way to share files on a group of computers is to create a network. But how do you do that?

Network Know-How is your guide to connecting your machines, filled with...

DevOps for Web Development
DevOps for Web Development

About This Book

  • Overcome the challenges of implementing DevOps for web applications, familiarize yourself with diverse third-party modules, and learn how to integrate them with bespoke code to efficiently complete tasks
  • Understand how to deploy web applications for a variety of Cloud platforms such as...
Korn Shell Programming by Example
Korn Shell Programming by Example
Korn Shell Programming by Example is a straight-forward, nuts and bolts book that will become a standard in the libraries of Unix administrators everywhere because of its real-life examples, progressive style, and lack of unnecessary fluff. Based on the Korn shell, it is an essential reference for administrators on how to program their system, and...
Smashing WordPress: Beyond the Blog
Smashing WordPress: Beyond the Blog

The ultimate guide to using WordPress to make your life easier

WordPress guru Thord Daniel Hedengren takes you beyond the blog to give you the tools and know-how needed to build just about anything in WordPress. You’ll discover how to use WordPress as a CMS to power fully-fledged websites, photo galleries, forums,...

Mastering VMware Horizon 6
Mastering VMware Horizon 6

Unlock the advanced features and full power of VMware Horizon 6 to deliver the industry's most comprehensive end-to-end user experience

About This Book

  • Learn why a EUC strategy is important, what it can deliver, and the approach you should take when starting out with your own project
  • ...
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

WordPress Plugin Development
WordPress Plugin Development

If you can write WordPress plug-ins, you can make WordPress do just about anything. From making the site easier to administer, to adding the odd tweak or new feature, to completely changing the way your blog works, plug-ins are the method WordPress offers to customize and extend its functionality. This book will show you how to build all...

MySQL Admin Cookbook
MySQL Admin Cookbook

MySQL is the most popular open-source database and is also known for its easy set up feature. However, proper configuration beyond the default settings still is a challenge, along with some other day-to-day maintenance tasks such as backing up and restoring, performance tuning, and server monitoring. These tasks have not been covered...

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers
Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers
A comprehensive and practical guide to PAM for Linux: how modules work and how to implement them, covering 11 common modules, and installation of third-party offerings. Also covers developing your own modules in C. First this book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It shows in...
SSL VPN : Understanding, evaluating and planning secure, web-based remote access
SSL VPN : Understanding, evaluating and planning secure, web-based remote access
Virtual Private Networks (VPNs) provide remote workers with secure access to their company network via the internet by encrypting all data sent between the company network and the user?s machine (the client). Before SSL VPN this typically required the client machine to have special software installed, or at least be specially configured for the...
Magento Mobile How-To
Magento Mobile How-To

Create and configure your own Magento Mobile application and publish it for the Android and iOS platforms

Overview

  • Style and theme your Magento Mobile Application interface
  • Configure Product categories and add static content for mobile
  • Prepare and publish your Magento mobile...
unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy