Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Vista® Resource Kit, Second Edition
Windows Vista® Resource Kit, Second Edition
Get the definitive reference for deploying, configuring, and supporting Windows Vista with expert insights from Microsoft Most Valuable Professionals (MVPs) and the Windows Vista Team at Microsoft. With additions and updates for SP1, this official Microsoft RESOURCE KIT provides more than 1,700 pages of in-depth technical guidance on automating...
Think UNIX (Que-Consumer-Other)
Think UNIX (Que-Consumer-Other)

Unix has a reputation for being cryptic and difficult to learn, but it doesn't need to be that way. Think Unix takes an analogous approach to that of a grammar book. Rather than teaching individual words or phrases like most books, Think Unix teaches the set of logical structures to be learned. Myriad examples help you learn individual commands,...

Active Directory Cookbook, 3rd Edition
Active Directory Cookbook, 3rd Edition
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
Microsoft Windows Nt Server 4.0 Enterprise Technologies Training Kit (Microsoft Official Curriculum)
Microsoft Windows Nt Server 4.0 Enterprise Technologies Training Kit (Microsoft Official Curriculum)
Microsoft Windows NT Server 4.0 Enterprise Technologies Training Kit is a combination text and software package that provides a self-paced training course based on the preparatory curriculum for the 70-068 Microsoft Certified Professional examination. Each chapter covers a major topic and contains a series of separate lessons.

...

grep Pocket Reference
grep Pocket Reference
grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket...
Emerging Free and Open Source Software Practices
Emerging Free and Open Source Software Practices
Project infrastructure and software repositories are now widely available at low cost with easy extraction, providing a foundational base to conduct detailed cyber-archeology at a scale not open to researchers before. Emerging Free and Open Source Software Practices provides a collection of empirical research acting as a focal point to the status...
The Complete Guide to Windows Server 2008 (Addison-Wesley Microsoft Technology Series)
The Complete Guide to Windows Server 2008 (Addison-Wesley Microsoft Technology Series)
“This book is an invaluable one-stop reference for deploying, configuring, and managing Windows Server 2008. It’s filled with John’s unique and hard-earned nuggets of advice, helpful scripts, and shortcuts that will save you time and money.”

--Mark Russinovich

 

...
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle
Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle
Managing Systems Migrations and Upgrades is the perfect book for technology managers who want a rational guide to evaluating the business aspects of various possible technical solutions. Enterprises today are in the middle of the R&D race for technology leadership, with providers who increasingly need to create markets for new technologies...
Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Sams Teach Yourself Samba in 24 Hours (2nd Edition)
    Sams Teach Yourself Samba in 24 Hours (2nd Edition)
    When Linux or Unix gets adopted by computing groups that already have users working with a version of the Windows platform, administrators overseeing the network integration of the two operating systems look to Samba to make a connection. Sams Teach Yourself Samba in 24 Hours furnishes 24 one-hour essential lessons geared toward...
    Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy