Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The CTO Job Manual: A Wealth of Reference Material and Thought Leadership on What Every Manager Needs to Know to Lead Their Technology Team
The CTO Job Manual: A Wealth of Reference Material and Thought Leadership on What Every Manager Needs to Know to Lead Their Technology Team
Why spend countless hours searching for relevant thought leadership articles, specific pieces of statistical data, and navigable reference information, when one resource provides it all? In The CTO Handbook, former CTO of IBM Next Generation Group Mark Minevich, guides readers through what need not be a daunting world of IT management - addressing...
Internet Routing Architectures (2nd Edition)
Internet Routing Architectures (2nd Edition)
The industry¿s leading resource for Internet routing solutions and scenariosExplore the functions, attributes, and applications of BGP-4, the de facto interdomain routing protocol, through practical scenarios and configuration examplesLearn the contemporary Internet structure and understand how to evaluate a service provider in dealing with...
Unix Shell Programming, Third Edition
Unix Shell Programming, Third Edition

Unix Shell Programming is a tutorial aimed at helping Unix and Linux users get optimal performance out of their operating out of their operating system. It shows them how to take control of their systems and work efficiently by harnessing the power of the shell to solve common problems. The reader learns everything he or she needs to know to...

Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

Broadband Optical Access Networks and Fiber-to-the-Home: Systems Technologies and Deployment Strategies
Broadband Optical Access Networks and Fiber-to-the-Home: Systems Technologies and Deployment Strategies
Broadband Optical Access and Fiber-to-the-Home (FTTH) will provide the ultimate broadband service capabilities.

Compared with the currently well-deployed broadband access technologies of ADSL (Asymmetric Digital Subscriber Line) and Cable Modems, optical broadband access with Fiber-to-the-User’s home will cater for...

Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
Microsoft Azure: Enterprise Application Development
Microsoft Azure: Enterprise Application Development

This fast-paced guide enables developers to design and build Enterprise applications for the cloud. You will find it easy to follow this book, as the authors use an actual online portal application for the case study. Throughout the development of the sample application there is discussion of important considerations for moving an application...

EJB 3 in Action
EJB 3 in Action
EJB 3 in Action tackles EJB 3 and the Java Persistence API head-on, providing practical code samples, real-life scenarios, best practices, design patterns, and performance tuning tips. This book builds on the contributions and strengths of seminal technologies like Spring, Hibernate, and TopLink.

EJB 3 is the most important innovation...

WAN Survival Guide: Strategies for VPNs and Multiservice Networks
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
Ensure that your WAN can handle the latest technologies with this must-have strategy guide

If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and
...
Microsoft  Windows  SharePoint  Services 3.0 Step by Step
Microsoft Windows SharePoint Services 3.0 Step by Step

The smart way to learn Microsoft Windows SharePoint Services Version 3.0 one step at a time! Work at your own pace through the easy numbered steps, practice files, helpful hints, and troubleshooting tips to master the fundamentals of working with the latest version of Windows SharePoint Services. You will learn the essentials for creating and...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy