Home | Amazing | Today | Tags | Publishers | Years | Search 
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

The Art of Game Design: A book of lenses
The Art of Game Design: A book of lenses

Anyone can master the fundamentals of game design no technological expertise is necessary. The Art of Game Design: A Book of Lenses shows that the same basic principles of psychology that work for board games, card games and athletic games also are the keys to making top-quality videogames. Good game design happens when you view your...

Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining addresses an issue unfortunately ignored by most authorities on data mining: data preparation. Thanks largely to its perceived difficulty, data preparation has traditionally taken a backseat to the more alluring question of how best to extract meaningful knowledge. But without adequate preparation of your...
Managing RAID on Linux
Managing RAID on Linux
"Finally, the book contains a good index and a brief appendix giving links to other sources. A very useful volume that should find favour with anyone who wishes to implement RAID on a Linux system." - Steve Boniwell, HP/Works

Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of
...
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Joe Grand's Best of Hardware, Wireless, & Game Console Hacking: Includes DVD with 20 Hacks in High-Res Color
Before you start your hacking projects, you'll need the right arsenal of tools. For some hacks, you might need only a single screwdriver. For others, you could need a workshop complete with power tools and advanced electronic equipment. For the most part, it isn't necessary to have a world-class laboratory or top-of-the-line computer system to...
Windows Server 2008 PKI and Certificate Security (PRO-Other)
Windows Server 2008 PKI and Certificate Security (PRO-Other)
Get in-depth guidance for designing and implementing certificate-based security solutions straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and...
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Cross-Platform Game Programming (Game Development)
Cross-Platform Game Programming (Game Development)
With many of today’s games being released simultaneously on all platforms, the need for a good cross-platform development strategy is essential. Cross-Platform Game Programming covers this rarely discussed area and provides the techniques needed to develop your games effectively. It explains the plethora of problems that exist within every...
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
The war in Iraq is not only controversial, it's also astronomically expensive. Now Rob Simpson answers the question many concerned Americans have been asking: Wasn't there some other way the government could have spent one trillion of our tax dollars?

What We Could Have Done with the Money presents 50 thought-provoking spending...

MCITP: Windows Server 2008 Enterprise Administrator Study Guide: (Exam 70-647)
MCITP: Windows Server 2008 Enterprise Administrator Study Guide: (Exam 70-647)
Learn everything about Microsoft’s brand new MCITP: Windows Server 2008 Enterprise Administrator exam with the helpful information in MCITP: Windows Server 2008 Enterprise Administrator Study Guide (Exam 70-647, with CD). Find complete exam coverage, including exam objectives, real-world scenarios, hands-on exercises, and...
Pro ASP.NET 3.5 in VB 2008: Includes Silverlight 2
Pro ASP.NET 3.5 in VB 2008: Includes Silverlight 2
ASP.NET 3.5 is the latest version of Microsoft’s revolutionary ASP.NET technology. It is the principal standard for creating dynamic web pages on the Windows platform. Pro ASP.NET 3.5 in VB 2008: Includes Silverlight 2 raises the bar for high–quality, practical advice on learning and deploying Microsoft’s dynamic web...
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy