 |
|
 Home Networking For Dummies (Computer/Tech)Integrate a Vista PC into your existing XP network
Share the Internet and work more efficiently from anywhere in your home!
Ready to become the administrator of your own home network? This bestselling guide has been fully updated to walk you through all the newest options... |  |  Windows® SharePoint® Services 3.0 Inside OutLearn everything you need to know for working with Microsoft Windows SharePoint Services Version 3.0. This book packs hundreds of time-saving solutions, troubleshooting tips, and workarounds for using and getting the most out of Windows SharePoint Services. You will learn how to simplify information sharing, make team collaboration more efficient,... |  |  Pulling Strings with Puppet: Configuration Management Made EasyCompetent system administrators know their success hinges upon being able to perform often tedious tasks with rigor and punctuality. Such metrics are often achieved only by instituting a considerable degree of automation, something that has become even more crucial as IT environments continue to scale both in terms of size and complexity. One of... |
|
 |  |  Linux Networking CookbookThis soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean... |  |  X Power ToolsThis book puts you in charge of the most flexible and adaptable graphical interface in the computer industry. The X Window System underlies graphical desktops on Linux and Unix systems, and supports advanced features of modern graphics cards. More people use the X Window System than ever before, but there are few books about X in print. X Power... |
|
 Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... |  |  |  |  |
|
|
Result Page: 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 |