Home | Amazing | Today | Tags | Publishers | Years | Search 
Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

XML in 60 Minutes a Day
XML in 60 Minutes a Day
Get up and running with XML using this innovative virtual classroom approach!

Interested in mastering XML? This revolutionary book and companion online presentation take you through 16 one-hour lessons that quickly get you up to speed on many of XML’s capabilities. With this unique approach and real-world perspective, you’ll be able...

Sams Teach Yourself Database Programming with Visual C++ 6 in 21 Days
Sams Teach Yourself Database Programming with Visual C++ 6 in 21 Days
In only 21 days, you'll have all the skills you need to get up and running efficiently. With this complete tutorial, you'll master the basics of database programming and then move on to the more advanced features and concepts. Understand the fundamentals of database programming in Visual C++. Master all the new and advanced database features that...
Excel 2003 Formulas
Excel 2003 Formulas
Everything you need to know about
  • Mastering operators, error values, naming techniques, and absolute versus relative references
  • Debugging formulas and using the auditing tools
  • Importing and exporting XML files and mapping the data to specific cells
  • Using Excel 2003’s rights management...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Configuring IPCop Firewalls: Closing Borders with Open Source
Configuring IPCop Firewalls: Closing Borders with Open Source
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for...
Successful Software Reengineering
Successful Software Reengineering
Software process reengineering has become highly visible over the past several years. Efforts are being undertaken by organizations of all types and sizes as they attempt to deal with the challenges of quality, complexity, and competitiveness. These efforts rely on the successful integration of many technical, organizational, and methodological...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

BusinessObjects XI (Release 2): The Complete Reference
BusinessObjects XI (Release 2): The Complete Reference
Gain the Competitive Edge with the Ultimate Resource on BusinessObjects XI Release 2

Publish actionable business reports across your enterprise using BusinessObjects XI and the detailed information contained in this one-stop resource. BusinessObjects XI: The Complete Reference explains, step-by-step, how to design...

Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
Business Continuity and Disaster Recovery Planning for IT Professionals
Business Continuity and Disaster Recovery Planning for IT Professionals
Increase Your Companys Odds of Surviving a Major Disaster

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a
...
Integrating Erp, Supply Chain Management, And Smart Materials
Integrating Erp, Supply Chain Management, And Smart Materials
Organizations enjoy two kinds of strategic advantages. One is transitory: being in the right place with the right products at the right time. The other comes from having first class management and instituting processes that mobilize an organization, keeping in ahead of the competition. Which would you like to count on for your organization's...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy