Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Solaris 10 Security Essentials
Solaris 10 Security Essentials

Solaris 10 Security Essentials describes the various security technologies contained in the Solaris operating system. The book describes how to make installations secure and how to configure the OS to the particular needs of your environment, whether your systems are on the edge of the...

Ipv6 Essentials
Ipv6 Essentials

IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6...

Domino 7 Lotus Notes Application Development
Domino 7 Lotus Notes Application Development
Raphael Savir has been a developer and consultant for Lotus Notes/Domino applications for 15 years. He has worked in numerous positions, focusing on performance and development topics. Raphael enjoys speaking on these topics, and has been fortunate in being able to do so frequently over the years.Now with LS Development Corporation...
Microsoft SQL Server 2008 R2 Unleashed
Microsoft SQL Server 2008 R2 Unleashed

This is the industry’s most comprehensive and useful guide to SQL Server 2008 and 2008 R2. It presents start-to-finish coverage of SQL Server’s core database server and management capabilities, plus complete introductions to Integration, Reporting, and Analysis Services, application development, and much...

Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Learn effective and scalable database design techniques in a SQL Server environment. Pro SQL Server 2008 Relational Database Design and Implementation covers everything from design logic that business users will understand all the way to the physical implementation of the design in a SQL Server database. Grounded in best practices and a...
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Network Programming for the Microsoft .NET Framework
Network Programming for the Microsoft .NET Framework

The definitive guide to building more powerful network applications using the .NET Framework. Learn the best ways to exploit the networking APIs in the .NET Framework—and deliver greater flexibility, interoperability, and power to your network applications. Three network programming specialists from Microsoft demonstrate how to use the...

Total Lion Superguide: Get to know Mac OS X 10.7
Total Lion Superguide: Get to know Mac OS X 10.7

Nobody spends more time with Apple’s computers and software than the writers and editors at Macworld, the world’s foremost Mac authority.

Now, let Macworld’s team of experts take you on a tour of Apple’s newest operating system, Mac OS X 10.7, aka Lion. Rebuilt to incorporate many of the lessons learned from...

Networking: A Beginner's Guide (Network Professional's Library)
Networking: A Beginner's Guide (Network Professional's Library)

Essential Skills--Made Easy!

Get a solid introduction to networking with this hands-on guide. You'll get all the core information you need to get started--including design and configuration, hardware, networking protocols, remote access, and security--plus, you'll find blueprints that map out network topologies and the OSI networking...

Advances in Crytology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security
Advances in Crytology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security

This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009.

The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy