Home | Amazing | Today | Tags | Publishers | Years | Search 
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
TCP/IP JumpStart: Internet Protocol Basics
TCP/IP JumpStart: Internet Protocol Basics
Build Your Internetworking Career on a Solid Foundation

Whether you’re setting out to earn a networking certification or just want to know more about how the Internet works, this fully updated edition of TCP/IP JumpStart is the place to start. Inside, a veteran network administrator and instructor demystifies...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will...
24P: Make Your Digital Movies Look Like Hollywood
24P: Make Your Digital Movies Look Like Hollywood
The digital video mode 24p captures imagery more nearly the way motion picture cameras do. It opens up a world of possibilities for digital filmmakers. But aspiring to 'film-look video' involves more than just flipping a switch on your camera. The authors share the secrets of Hollywood-style production so you can give your movie a truly polished,...
Beginning Xcode (Programmer to Programmer)
Beginning Xcode (Programmer to Programmer)
Bringing together the ease of use of Mac OS X, the power of Unix, and a mix of high-performance development technologies, Xcode is Apple's hottest new integrated development environment. This book shows you why Xcode is the fastest and easiest way for developers to create Mac OS X applications.

Covering the basic fundamentals...

2500 Keywords to Get You Hired
2500 Keywords to Get You Hired

Make that important first cut with a resume that packs a punch with 2500 Keywords to Get You Hired

What's in a word? When used effectively on your resume, the right words could land you your next job! 2500 Keywords to Get You Hired breaks down the buzz on buzzwords-those powerful little...

CCNP Support Study Guide Exam 640-506
CCNP Support Study Guide Exam 640-506
Get ready for your future today! Cisco's new Support exam is a requirement for the Cisco Certified Network Professional (CCNP) program. With full coverage of all exam objectives, you'll learn techniques and strategies for baselining and troubleshooting an environment using Cisco routers and switches for multiprotocol client hosts and servers. The...
Linux Web Hosting With Websphere, DB2, and Domino
Linux Web Hosting With Websphere, DB2, and Domino
This redbook is intended to assist Web server administrators utilize IBM software offerings to build and manage a Web server using Linux as the base operating system. It is assumed that the reader has basic Linux administration skills, an understanding of general HTML syntax, and is knowledgeable in Java programming.Therefore, this redbook is not...
PHP and MySQL Web Development
PHP and MySQL Web Development
Topics covered:

  • The MySQL database server (for both Unix and Windows)
  • Accessing MySQL databases through PHP scripting (the letters don't really stand for anything)
  • Database creation and modification
  • PHP tricks in order of increasing complexity--everything from...
Ethical Hacking
Ethical Hacking
By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50...
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy