Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning the Linux Command Line
Beginning the Linux Command Line
This is Linux for those of us who don’t mind typing. All Linux users and administrators tend to like the flexibility and speed of Linux administration from the command line in byte–sized chunks, instead of fairly standard GUIs. Beginning the Linux Command Line follows a task–oriented approach and is distribution agnostic....
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the...

Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic...
501 Killer Marketing Tactics to Increase Sales, Maximize Profits, and Stomp Your Competition: Revised and Expanded Second Edition
501 Killer Marketing Tactics to Increase Sales, Maximize Profits, and Stomp Your Competition: Revised and Expanded Second Edition

Bigger, Badder, Better!
ATTACK OF THE KILLER MARKETING TACTICS!

A few years back, marketing super-guru Tom Feltenstein in rewrote the book on high-impact marketing that works. Fast-forward to today and new technologies, more sophisticated consumers/competitors, and a whole new media...

Microsoft Exchange Server 2003 Administrator's Companion
Microsoft Exchange Server 2003 Administrator's Companion

Get your mission-critical messaging and collaboration systems up and running quickly with the essential guide to deploying and managing Exchange Server 2003. This comprehensive administrator’s reference details system features and capabilities, sharing hands-on insights for working with new connectivity, information management, and...

Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.

The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed...

Cocoa Touch for iPhone OS 3 (Developer Reference)
Cocoa Touch for iPhone OS 3 (Developer Reference)

Join the gold rush to developing cool iPhone apps with this complete iPhone OS 3 developer’s guide. Professional developer Jiva DeVoe speaks your language, and he talks you through the entire process—from explaining Cocoa Touch and the iPhone SDK to using Xcode and the Game Kit API. Follow step-by-step tutorials, then apply practical...

TCP/IP For Dummies (Computer/Tech)
TCP/IP For Dummies (Computer/Tech)
Packed with the latest information on TCP/IP standards and protocols

TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dummies, 6th Edition, is both an introduction to the basics for...

RibbonX: Customizing the Office 2007 Ribbon
RibbonX: Customizing the Office 2007 Ribbon
Microsoft MVPs teach you new skills for customizing the Ribbon

If you like to build custom applications or customize the Office user interface, this book is for you. Written by a team of Microsoft MVPs, it shows you—step by step—how easy it is to modify the Microsoft Office® 2007 Ribbon, how the Ribbon works,...

CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)

Here's the book you need to prepare for Cisco's Secure PIX Firewall (CSPFA) and Secure VPN (CSVPN) exams.

This two-in-one Study Guide provides:

  • In-depth coverage of all exam topics
  • Practical information on implementing Cisco's Secure PIX and Secure VPN technologies
  • ...
Implementing SSL / TLS Using Cryptography and PKI
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or...

Radar and ARPA Manual, Second Edition: Radar and Target Tracking for Professional Mariners, Yachtsmen and Users of Marine Radar
Radar and ARPA Manual, Second Edition: Radar and Target Tracking for Professional Mariners, Yachtsmen and Users of Marine Radar
Radar systems are fitted on all commercial vessels, and are widely used in the leisure maritime sector as well as vessel traffic services (VTS). They are frequently used in conjunction with an Automatic Target Tracking Device, traditionally known as the ARPA (Automatic Radar Plotting Aid). This fully revised new edition covers the complete...
Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy