Home | Amazing | Today | Tags | Publishers | Years | Search 
Applications of Information Systems to Homeland Security And Defense
Applications of Information Systems to Homeland Security And Defense
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...
Lotus Domino 6 for Linux
Lotus Domino 6 for Linux
This IBM Redbook describes how to run the IBM Lotus Domino 6 server on the Linux platform. While Lotus Domino 6 is platform-independent, some specific knowledge about the platform and configuration is required to ensure that the Domino 6 server is running most efficiently.

The book provides detailed instructions for installing Linux and
...
SQL Server 7 Backup & Recovery
SQL Server 7 Backup & Recovery
Protect your organization's most valuable asset--its data. Develop and implement a thorough data protection solution for your SQL Server 7 database environment. SQL Server 7 Backup & Recovery is your one-stop resource for planning, developing, implementing, and managing backup and restore procedures. Learn to execute data protection strategies,...
Windows 2000 Administration in a Nutshell : A Desktop Quick Reference
Windows 2000 Administration in a Nutshell : A Desktop Quick Reference
Anyone who installs Windows 2000, creates a user, or adds a printer is a 2000 system administrator. This book covers all the important day-to-day administrative tasks, and the tools for performing each task are included in a handy easy-to-look-up alphabetical reference. What's the same and what's different between the Windows 2000 and Windows NT...
DNS on Windows 2000
DNS on Windows 2000
This special Windows-oriented edition of the classic DNS and BIND is a guide to one of the Internet's fundamental building blocks: the distributed host information database responsible for translating names into addresses, routing mail, and many other services. Covers server setup and maintenance along with...
Webmaster in a Nutshell, Third Edition
Webmaster in a Nutshell, Third Edition
This book is for web developers, or anyone who works at the content end of the World Wide Web. Do you author or maintain web documents? Are you a programmer developing web-based client or server applications? Are you the administrator of a web site, responsible for maintaining and updating server software?

There are innumerable books and
...
MCSE Core Elective Exams in a Nutshell
MCSE Core Elective Exams in a Nutshell

For Windows XP and Windows Server 2003 administrators preparing for
Microsoft Certified Systems Engineer (MCSE) core exam 70-270, and core exams 70-297, and 70-298, this book is invaluable. Not only does it provide the resources you need to succeed on the exams, but to succeed in the real world as well. Think of this book
...

Linux Application Development (2nd Edition)
Linux Application Development (2nd Edition)

"The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it."
--Greg Kroah-Hartman, Linux kernel programmer

Develop Software that...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Solaris and LDAP Naming Services: Deploying LDAP in the Enterprise
Solaris and LDAP Naming Services: Deploying LDAP in the Enterprise
This book is one of an on-going series of books collectively known as the Sun
BluePrints™ program. The Solaris™ and LDAP Naming Services BluePrint describes
best practices for planning and deploying naming services based on the Lightweight
Directory Access Protocol (LDAP). The introduction of native LDAP in the Solaris
...
Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Digital Design (3rd Edition)
Digital Design (3rd Edition)
Digital design is concerned with the design of digital electronic circuits. Digital circuits are employed in the design and construction of systems such as digital computers, data communication, digital recording, and many other applications that require digital hardware. This book presents the basic tools for the design of digital circuits and...
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy