Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security...
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
SolidWorks Administration Bible
SolidWorks Administration Bible

Welcome to the SolidWorks Administration Bible. This book has been written as a desk reference for anyone charged with installing, implementing, and maintaining SolidWorks and Workgroup PDM for yourself or for other users in your company.

Whether you are a professional CAD Administrator, a full-time engineer or designer pressed...

OpenStack Cloud Security
OpenStack Cloud Security

Build a secure OpenStack cloud to withstand all common attacks

About This Book

  • Design, implement, and deliver a safe and sound OpenStack cluster using best practices
  • Create a production-ready environment and protect your data on the cloud
  • A step-by-step tutorial packed with...
Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database
Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database

Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than helping. Maintain indexes so as to provide consistent and predictable query response over...

Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started
Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started

Become a Linux sysadmin and expert user of Linux, even with no previous Linux experience and learn to manage complex systems with ease.  Volume 1 of this three volume training course introduces operating systems in general and Linux in particular. It briefly explores the The Linux Philosophy for SysAdmins in preparation for the...

10 Minute Guide to Microsoft(R) Access 2002
10 Minute Guide to Microsoft(R) Access 2002
The 10 Minute Guide to MS Access 2002 quickly explains the most common beginning and intermediate level tasks an Access user would need. This book focuses on the most often used features, covering them in lessons designed to take ten minutes or less to complete. In addition, this guide teaches the user how to use...
Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

How Linux Works
How Linux Works

Whether you're a systems administrator or a home user, you need to understand how Linux internals work before you can really master Linux-how it boots, how networking works, how to customize the kernel, and even what hardware to buy.

How Linux Works contains the kind of information normally handed down from
...

Sams Teach Yourself UNIX System Administration in 24 Hours
Sams Teach Yourself UNIX System Administration in 24 Hours

In the wake of the highly successful Sams Teach Yourself Unix in 24 Hours, this book focuses on the additional Unix commands that an advanced user or beginning system administrator needs to know in order to administer and maintain a Unix system. The book includes coverage of the key Unix variations: Red Hat Linux, Solaris, HPUX, and Apple's Mac...

Solaris Solutions for System Administrators: Time-Saving Tips, Techniques, and Workarounds, Second Edition
Solaris Solutions for System Administrators: Time-Saving Tips, Techniques, and Workarounds, Second Edition
Learn how to work smart and avoid common pitfalls of managing Solaris systems

The Solaris operating system is used by hundreds of thousands of companies worldwide to run everything from Web services to back-end financial systems. The Solaris 9 release improves manageability; however, it also increases the complexity of the operating environment...

MCTS Self-Paced Training Kit (Exams 70-648 & 70-649): Transitioning Your MCSA/MCSE to Windows Server® 2008
MCTS Self-Paced Training Kit (Exams 70-648 & 70-649): Transitioning Your MCSA/MCSE to Windows Server® 2008
Your 2-in-1 Self-Paced Training Kit includes exam prep and practice for Exams 70-648 and 70-649.Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on the 70-648 and 70-649 upgrade exams for the new Microsoft® Certified Technology Specialist (MCTS): Windows Server 2008...
unlimited object storage image
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy