Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MCSA/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000 System Administration, 70-228, Second Edition
MCSA/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000 System Administration, 70-228, Second Edition

Learn how to install, configure and troubleshoot SQL Server 2000—and prepare for the Microsoft Certified Professional (MCP) exam—with this official Microsoft study guide. Work at your own pace through the lessons and hands-on exercises. And use the special exam-prep section and testing tool to measure what you know and where to focus...

Network Warrior
Network Warrior

Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Using and Managing PPP
Using and Managing PPP

In the last decade, the Internet has grown from a network that connected a few universities and research centers to a network that links many businesses and households all over the country. That expansion occurred for many reasons, but the technological advance that facilitated this growth was an obscure protocol called PPP.PPP...

The Definitive Guide to SugarCRM: Better Business Applications
The Definitive Guide to SugarCRM: Better Business Applications

SugarCRM is a leading open source Customer Relations Management tool and development platform with nearly 5.5 million downloads, nearly 17,000 developers, and lots more users.

The Definitive Guide to SugarCRM is the first official SugarCRM book available to developers and users. This definitive book begins by talking about the...

Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Agile Web Application Development with Yii 1.1 and PHP5
Agile Web Application Development with Yii 1.1 and PHP5

This book is a step by step tutorial in developing a real-world application using the incremental and iterative approach to software development. You learn about agile software development by leaning on the agile nature of the Yii application development framework. You touch on each aspect of the software development lifecycle by building a...

Complete Book of Remote Access: Connectivity and Security (Best Practices)
Complete Book of Remote Access: Connectivity and Security (Best Practices)

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how...

Hack Proofing Windows 2000 Server
Hack Proofing Windows 2000 Server
Essential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include...
Professional J2EE Programming with BEA WebLogic Server
Professional J2EE Programming with BEA WebLogic Server
Despite its wordy title, Professional Java 2 Enterprise Edition with BEA WebLogic Server actually is one of the better books that you can get for learning JSP-based programming with Java and Enterprise JavaBeans (EJBs). By highlighting practical matters--including setting up and running the popular BEA WebLogic Server, and benchmarking...
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)

Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy