Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Piracy Exposed
Software Piracy Exposed
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software...
How To Do Everything with Your Pocket PC, 3rd Edition
How To Do Everything with Your Pocket PC, 3rd Edition

Make your Pocket PC your own personal information appliance. This easy-to-follow guide will teach you everyday essentials such as managing appointments, keeping addresses, and making task lists. It shows you in a clear, step-by-step format, how to retrieve your e-mail and surf the Web, write and format letters, balance your checkbook, make voice...

FreeBSD Unleashed (With CD-ROM)
FreeBSD Unleashed (With CD-ROM)
Did you know that the special effects used in The Matrix were rendered using the FreeBSD system? Yahoo and the Internet Movie Database are also powered by FreeBSD. Now you can learn how to use FreeBSD to its full potential as well! FreeBSD Unleashed is a complete reference guide for FreeBSD administrators, developers, webmasters...
Implementing Netscaler VPX
Implementing Netscaler VPX

Leverage the features of NetScaler VPX™ to optimize and deploy responsive web services and applications on multiple virtualization platforms

Overview

  • Learn how to design, set up, and deploy Netscaler VPX in a virtual environment to make all your Web applications faster and secure
  • ...
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

The definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco Adaptive Security Appliance

  • Delivers expert guidance from Cisco TAC engineers for securing small and medium business networks with the newly released Cisco all-in-one network security...

Embedded Linux
Embedded Linux

Embedded Linux provides the reader the information needed to design, develop, and debug an embedded Linux appliance. It explores why Linux is a great choice for an embedded application and what to look for when choosing hardware.

...
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the
...
Production Rendering
Production Rendering

In the past, rendering systems used a range of different approaches, each compatible and able to handle certain kinds of images. However, the last few years have seen the development of practical techniques, which bring together many areas of research into stable, production ready rendering tools. Written by experienced graphics software...

Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
PC Magazine - 21 August 2007
PC Magazine - 21 August 2007
First Looks
GoToMeeting v3.0
GuardedID 1.02
Howard Verity TW3
Kodak EasyShare 5300 All-In-One printer
Logitech X-240
MSI Q677 Crystal Edition
Nokia E61i
Oki Printing Solutions C6000n
Panasonic Lumix DMC-FZ8
RealPlayer 11 (beta)
Sennheiser PXC 450 NoiseGard
Sony VAIO VGN-SZ370P
Adobe
...
Oracle Exadata Survival Guide (Expert's Voice in Oracle)
Oracle Exadata Survival Guide (Expert's Voice in Oracle)

Oracle Exadata Survival Guide is a hands-on guide for busy Oracle database administrators who are migrating their skill sets to Oracle's Exadata database appliance. The book covers the concepts behind Exadata, and the available configurations for features such as smart scans, storage indexes, Smart Flash Cache, hybrid columnar...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy