Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
LDAP Programming, Management, and Integration
LDAP Programming, Management, and Integration
Focusing on the practical application of the Lightweight Directory Access Protocol, this tutorial is geared toward IS professionals and software developers who are responsible for getting the maximum potential from their directories by integrating them with existing processes and applications. As the Internet standard for directory services, LDAP...
Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
Qmail Quickstarter: Install, Set Up and Run your own Email Server
Qmail Quickstarter: Install, Set Up and Run your own Email Server

A fast-paced and easy-to-follow, step-by-step guide that gets you up and running quickly

  • Qmail Basics
  • Storing and retrieving of emails
  • Virtualisation
  • Filtering Spam
  • Hosting Multiple Domains, Encryption, and Mailing Lists

In Detail

This book...

Getting Started with Your Mac and Mac OS X Tiger : Peachpit Learning Series
Getting Started with Your Mac and Mac OS X Tiger : Peachpit Learning Series

You bought your Mac OS X Tiger computer because you thought it would be easy to use-and it is! But if you've never used a computer before, never stared at a graphical user interface or clicked an icon to launch a program or open a file, getting going with your new machine can still be a daunting proposition. With this guide from...

Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

Droids Made Simple: For the Droid, Droid X, Droid 2, and Droid 2 Global (Made Simple (Apress))
Droids Made Simple: For the Droid, Droid X, Droid 2, and Droid 2 Global (Made Simple (Apress))

If you have a Droid series smartphone—Droid, Droid X, Droid 2, or Droid 2 Global—and are eager to get the most out of your device, Droids Made Simple is perfect for you. Authors Martin Trautschold, Gary Mazo and Marziah Karch guide you through all of the features, tips,...

The Adobe Photoshop Elements Crafts Book
The Adobe Photoshop Elements Crafts Book

Millions of people own digital cameras, yet most of us just store our digital photos on a hard drive or email them to friends. But what if you want to get a little more creative with your images? Armed with little more than a copy of Photoshop Elements, a computer, an inkjet printer, and a handful of basic tools, you can...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
iPhone: The Missing Manual: Covers iPhone 4 & All Other Models with iOS 4 Software
iPhone: The Missing Manual: Covers iPhone 4 & All Other Models with iOS 4 Software

With multitasking and more than a 100 other new features, iPhone 4.0 is a real treat, cooked up with Apple's traditional secret sauce of simplicity, intelligence, and whimsy. iPhone: The Missing Manual gives you a guided tour of everything the new iPhone has to offer, with lots of tips, tricks, and surprises. Learn how to...

The Ultimate Web Marketing Guide
The Ultimate Web Marketing Guide

EVERYTHING YOU NEED TO KNOW ABOUT WEB, MOBILE, & SOCIAL MARKETING!

  • Your expert, up-to-the-minute, A-Z reference & how-to guide
  • Choose the right goals, media, & tools
  • ...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Learn OS X Lion
Learn OS X Lion

You’re smart and savvy, but you're also busy. This comprehensive guide to Apple's latest version of OS X, Lion, gives you everything you need to know to live a happy, productive Mac life. Learn OS X Lion will have you up and connected right away. With a minimum of overhead and a maximum of useful information,...

unlimited object storage image
Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy