 |
|
 How to Cheat at Configuring VmWare ESX ServerThis book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine... |  |  Microsoft® Office Project Server 2007: The Complete ReferenceWhen we embarked on this endeavor, we knew that the tools that made up Microsoft’s Enterprise Project Management (EPM) solution were large and complex. Writing a book on the topic was going to require a significant amount of work and focus. We are grateful to have been selected to add this book to the McGraw-Hill Complete Reference series.... |  |  |
|
 Oracle PL/SQL Language Pocket ReferenceThe fourth edition of this popular pocket guide provides quick-reference information that will help you use Oracle's PL/SQL language, including the newest Oracle Database 11g features. It's a companion to Steven Feuerstein and Bill Pribyl's bestselling Oracle PL/SQL Programming. This concise guide boils down the most vital... |  |  PHP Objects, Patterns, and Practice, Second Edition
Backed by a tireless development community, PHP has been a model of language evolution over its 10+ year history. Borne from a contract developer’s pet project, these days you’ll find PHP powering many of the world’s largest web sites, including Yahoo!, Digg, EA Games, and Lycos.
PHP Objects, Patterns, and... |  |  Mac OS X Leopard: Beyond the ManualMac OS X is quickly becoming one of the most popular operating systems for power users. Mac OS X’s ability to mesh an easy-to-use and attractive interface with a Unix back end has attracted average and power users to the Mac. In 2007, Apple releases the next version of Mac OS X: Leopard.
Mac OS X Leopard: Beyond the Manual is... |
|
 Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... |  |  |  |  Building a Server with FreeBSD 7The most difficult aspect of building a server (to act as a file server, Web server, or mail server) is the initial software installation and configuration. Getting your hands on the software is one thing; getting it all to function is another thing entirely. For many people, the only option is to hire an expensive consultant. Building a Server... |
|
 |  |  |  |  The Best Damn Exchange, SQL and IIS Book PeriodExchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support... |
|
| Result Page: 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 |