Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Spring Recipes: A Problem-Solution Approach, Second Edition
Spring Recipes: A Problem-Solution Approach, Second Edition

With over 3 Million users/developers, Spring Framework is the leading “out of the box” Java framework. Spring addresses and offers simple solutions for most aspects of your Java/Java EE application development, and guides you to use industry best practices to design and implement your applications.

The release of Spring...

Programming C#
Programming C#
C# is designed from the ground up for development on Microsoft's new .NET framework. As such, it's a high-performance language that's simple, safe, object-oriented, and Internet-centric. Programming C# teaches this new language in a way that experienced programmers will appreciate--by grounding its applications firmly in the context of...
Infrastructure Public-Private Partnerships: Decision, Management and Development
Infrastructure Public-Private Partnerships: Decision, Management and Development

Economic development and social welfare depend on the existence of effective and efficient infrastructure systems, particularly in health, energy, transportation and water, many of which are developed and managed through Public-Private Partnerships (PPPs). However, empirical evidence suggests some pitfalls in the use of these PPP...

The Rise and Decline of the State
The Rise and Decline of the State
The state, which since the middle of the seventeenth century has been the most important and most characteristic of all moderninstitutions, is in decline. From Western Europe to Africa, either voluntarily or involuntarily, many existing states are either combining into larger communities or falling apart. Regardless of whether they fall apart or...
High-Rise Security and Fire Life Safety
High-Rise Security and Fire Life Safety
Due to their design and construction, high-rise buildings are unique structures with specialized needs. To protect the lives and property of the multitudes of people who daily use these facilities, it is essential that high-rise security and fire life safety programs be well planned and executed. Useful reference materials for commercial real...
The Art of XSD - SQL Server XML schemas
The Art of XSD - SQL Server XML schemas

When information is exchanged in XML format, there needs to be an agreement between the sender and receiver about the structure and content of the XML document. An XSD (XML Schema Definition Language) Schema can be used to enforce this contract and validate the XML data being exchanged and, given that a lot of applications exchange...

Microeconomics: Theory and Applications with Calculus Value Package (includes Study Guide for Microeconomics: Theory and Applications with Calculus)
Microeconomics: Theory and Applications with Calculus Value Package (includes Study Guide for Microeconomics: Theory and Applications with Calculus)

his book is a new type of intermediate macroeconomics textbook- Until now, the choice was between books that use calculus to present formal theory dryly and with few, if any, applications to the real world and books that include applications but present theory using only graphs and algebra. This book uses calcu- lus, algebra, and graphs to...

SEO Warrior
SEO Warrior

I was compelled to write SEO Warrior for many reasons. Every day, thousands of sites are born in the hopes of making it big. Most of them will fail before achieving their goals. Many site owners create their sites blindly, without conducting proper research. Many site owners do not even know what search engine optimization (SEO) is and what its...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Objects, Abstraction, Data Structures and Design: Using C++
Objects, Abstraction, Data Structures and Design: Using C++
Our goal in writing this book was to combine a strong emphasis on problem solving and software design with the study of data structures. To this end, we discuss applications of each data structure to motivate its study. After providing the specification (a header file) and the implementation of an abstract data type, we cover case...
Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding
Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding

Why should you, a competent software developer or programmer, care about your own brand? After all, it’s not like you're an actor or musician.

In fact, as Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding demonstrates in...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy