Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Pragmatic Guide to JavaScript (Pragmatic Guides)
Pragmatic Guide to JavaScript (Pragmatic Guides)

The JavaScript ecosystem can be tough to hack through, even for experienced programmers. There are so many extensive JavaScript reference books and competing libraries to choose from-Prototype, jQuery, MooTools, YUI, Dojo, ExtJS, and so on.

Christophe Porteneuve is here to help: he gives you fundamentals, the most
...

How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
The Perfect Reference for the Multitasked System Administrators
The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing
...
iPhone and iPad Apps for Absolute Beginners
iPhone and iPad Apps for Absolute Beginners

So how do you build an application for the iPhone and iPad? Don’t you need to spend years learning complicated programming languages? What about Objective-C and Cocoa touch? The answer is that you don’t need to know any of those things! Anybody can start building simple apps for the iPhone and iPad, and this book will show you...

ALGO TRADING CHEAT CODES: Techniques For Traders To Quickly And Efficiently Develop Better Algorithmic Trading Systems
ALGO TRADING CHEAT CODES: Techniques For Traders To Quickly And Efficiently Develop Better Algorithmic Trading Systems
Algo trading and strategy development is hard, no question. But, does it really have to be so hard?The answer is "NO!" - if you follow the right approach, and get the right advice. Enter Champion Algo Trader Kevin Davey, and his book "Algo Trading Cheat Codes." In this groundbreaking book, Kevin reveals results of his...
How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
How to Cheat at IIS 7 Server Administration
How to Cheat at IIS 7 Server Administration
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of...
Ham Radio for Dummies
Ham Radio for Dummies
You can be a lifesaver while you make new friends

Find out about ham radio, prepare for your license, and join the fun!

Hams do cool things like talking to folks around the world and helping with communications during emergencies. If hamming it up sounds like fun, here’s the scoop, including licensing requirements and how to...

Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
HTML: The Definitive Guide
HTML: The Definitive Guide
In the most recent edition of this acclaimed HTML guide, Musciano and Kennedy look closely at every aspect of HTML and show how to use it wisely to create top-quality Web pages. The book is up-to-date, covering HTML 4, Netscape Navigator 4, Microsoft Internet Explorer 4, and the various extensions of each.

HTML: The Definitive Guide...

The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy