|
|
How to Cheat at Securing LinuxLinux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased... | | Windows Vista Administration: The Definitive GuideWhether you're a system administrator responsible for hundreds of Windows clients, or a just a roomful of computers, this book will help you install, configure, and maintain Microsoft's newest OS. Written in jargon-free English that puts concepts in proper context, the book gives you a better understanding of Vista's innovations and capabilities,... | | |
|
| | The Definitive Guide to GCC, Second Edition
The GNU Compiler Collection (GCC) offers a variety of compilers for different programming languages including C, C++, Java, Fortran, and Ada. The Definitive Guide to GCC, Second Edition has been revised to reflect the changes made in the most recent major GCC release, version 4. Providing in-depth information on GCC's enormous... | | Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... |
|
Juniper(r) Networks Secure Access SSL VPN Configuration GuideJuniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for... | | Data Mining with Microsoft SQL Server 2000 Technical ReferenceWith its state-of-the-art capabilities for rapidly processing and retrieving huge quantities of data, Microsoft® SQL Server 2000 is quickly growing in popularity among large corporations. But learning how to take advantage of the powerful, built-in data-mining services in SQL Server to turn all that data into meaningful information takes time... | | How to Cheat at Deploying and Securing RFIDRFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.
For security... |
|
| | Test Driving Linux: From Windows to Linux in 60 SecondsFor years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you... | | Mac OS X Panther for Unix GeeksWith its rep for being the sort of machine that won't intimidate even the most inexperienced users, what's the appeal of the Mac® for hard-core geeks? The Mac has always been an efficient tool, pleasant to use and customize, and eminently hackable. But now with Mac OS® X's BSD core, many a Unix® developer has found it irresistible. The... |
|
Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 |