Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Postfix (Other Sams)
Postfix (Other Sams)
Networking guide to the Postfix Mail Transfer software package, showing how to configure Postfix for specific tasks, how to use external databases with Postfix, and how to migrate from Sendmail. Also explains e-mail protocols, setting up Postfix as an ISP or office mail server, and using list servers and Web mail interfaces with Postfix. Softcover....
Goddess of the Market: Ayn Rand and the American Right
Goddess of the Market: Ayn Rand and the American Right

Worshipped by her fans, denounced by her enemies, and forever shadowed by controversy and scandal, the novelist and philosopher Ayn Rand was a powerful thinker whose views on government and markets shaped the conservative movement from its earliest days. Drawing on unprecedented access to Rand's private papers and the original, unedited...

Business Innovation and Disruptive Technology: Harnessing the Power of Breakthrough Technology
Business Innovation and Disruptive Technology: Harnessing the Power of Breakthrough Technology

This book is designed to be a handbook for executives who want to gain the latest insights and strategies for identifying and leveraging emerging and disruptive technologies in the software arena for "back to basics" enterprise value creation, competitive advantage, and increased business agility...

Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
Secure Key Establishment (Advances in Information Security)
Secure Key Establishment (Advances in Information Security)
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants...

SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...
Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
THWART THE LATEST DISASTROUS ATTACKS

Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the...

The Rational Unified Process: An Introduction, Third Edition
The Rational Unified Process: An Introduction, Third Edition

The Rational Unified Process, Third Edition, is a concise introduction to IBM's Web-enabled software engineering process. Rational Unified Process®, or RUP®, Lead Architect Philippe Kruchten quickly and clearly describes the concepts, structure, content, and motivation that are central to the RUP. Readers will...

Policy-Driven Mobile Ad hoc Network Management (Wiley Series in Telecommunications and Signal Processing)
Policy-Driven Mobile Ad hoc Network Management (Wiley Series in Telecommunications and Signal Processing)
This book discusses the management challenges associated with ad hoc networks, and provides an in-depth description of how policy-based network management can be used for increasing automation in the management of mobile ad hoc networks. It describes the required components of a network management solution for such networks, using a policy-based...
Wiki at War: Conflict in a Socially Networked World
Wiki at War: Conflict in a Socially Networked World
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide
...
Cube Farm
Cube Farm

Truth is often stranger than fiction, especially when it comes to the workplace. In Cube Farm, author Bill Blunden recounts his three years in Minnesota performing research and development for Lawson Software. Riddled with intrigue, duplicity and collusion, this story offers a trench-level view of a company in the...

Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense

"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy