 |
|
|
|
 Microsoft Windows 2000 Scripting GuideWelcome to the Microsoft® Windows® 2000 Scripting Guide.
As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a... |  |  Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible"One stop shopping for J2EE." – Scott Ambler, Senior Consultant, Ronin International, Inc. and Author of Agile Modeling
If Java 2 Enterprise Edition 1.4 can do it, you can do it too...
You already know that Java 2 Enterprise Edition 1.4 makes your enterprise services more cost-effective, more adaptable,... |  |  Extreme Exploits: Advanced Defenses Against Hardcore HacksProtect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses... |
|
|
|
 Buffer Overflow AttacksBuffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have... |  |  DNS on Windows Server 2003DNS on Windows Server 20003 is a special Windows-oriented edition of the classic DNS and BIND, newly updated to document the many changes to DNS, large and small, found in Windows Server 2003. Veteran O'Reilly authors, Cricket Liu, Matt Larson, and Robbie Allen explain the whole... |  |  Mastering OpenLDAP: Configuring, Securing and Integrating Directory ServicesThis book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 |