|
|
|
|
Deploying OpenLDAP
...I was excited to see Deploying OpenLDAP, by Tom Jackiewicz and published by Apress, on Amazon's electronic bookshelf. After reviewing the Table of Contents I quickly ordered the book.
For all the work and time invested in using LDAP, not enough time has been spent designing the layout and the logic of directories. End... | | Rootkits: Subverting the Windows KernelRootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James... | | Core JavaServer(TM) Faces, Second Edition (2nd Edition) (Core Series)JavaServer Faces (JSF) is quickly emerging as the leading solution for rapid user interface development in Java-based server-side applications. Now, Core JavaServer™ Faces—the #1 guide to JSF—has been thoroughly updated in this second edition, covering the latest feature enhancements, the... |
|
|
UNIX System Programming for System VR4 (Nutshell Handbooks)
Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing... | | UNIX: The Complete Reference, Second EditionGet cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second... | | Unix for Mac : Your visual blueprintї to maximizing the foundation of Mac OS X* Mac OS X combines the Unix power developers need with Mac's ease of use, offering a unique combination of technical elements with enhanced performance, compatibility, and usability
* Shows readers how to use the Terminal application and the command interface, and explores the many Unix applications using step-by-step screen shots ... |
|
IIS 6 AdministrationThis practical, task-oriented guide explains exactly what you need to know in order to deploy, configure, manage, monitor, and troubleshoot Internet Information Services 6 (IIS 6) on the Microsoft Windows Server 2003 platform. Author Mitch Tulloch skillfully details essential day-to-day administrations tasks and includes dozens of invaluable... | | International Directory of Business Biographies Edition 1.Choice : "Entries are well written and easy to understand, Summing Up: Highly Recommended." --Choice, June 2005
As the modern business world continues to expand, today's business researchers are in search of a more global perspective. Unlike many other directories, this four-volume set... | | Securing LINUX Step by StepThis guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |