 |
|
 Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
The world of hacking is a world of pain and frustration. Frustration for the hacker as
he tries to figure out how to break the latest and greatest security device, and pain for
the manufacturer or corporation that made or was relying on that device.
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and... |  |  Learning FreeNAS: Configure and manage a network attached storage solution
FreeNAS is a free piece of software that turns a PC into Network Attached Storage (NAS). It supports connections from Microsoft Windows, Apple OS X, Linux, and FreeBSD. It supports RAID, has a simple web GUI, and modest system requirements. Since FreeNAS is an embedded operating system, it is compact, efficient, and dedicated to just one... |  |  |
|
 |  |  Java: The Good Parts
What if you could condense Java down to its very best features and build better applications with that simpler version? In this book, veteran Sun Labs engineer Jim Waldo reveals which parts of Java are most useful, and why those features make Java among the best programming languages available.
Every language eventually... |  |  Pentaho 3.2 Data Integration: Beginner's Guide
Pentaho Data Integration (a.k.a. Kettle) is a full-featured open source ETL (Extract, Transform, and Load) solution. Although PDI is a feature-rich tool, effectively capturing, manipulating, cleansing, transferring, and loading data can get complicated.
This book is full of practical examples that will help you to take advantage of... |
|
|
 The 3CX IP PBX Tutorial
Traditional PBX systems have often been expensive and proprietary. With 3CX, you can now create an easy-to-use, complete, and cost-effective phone system on Microsoft Windows. This practical guide offers the insight that a reader needs to exploit the potential that 3CX has to offer.
This practical hands-on book covers everything... |  |  Principles of Cybercrime
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every... |  |  UML For The IT Business Analyst, Second Edition
Today, information-technology business analysts are often working on object-oriented (OO), Unified Modeling Language (UML) projects, yet they have a long way to go to exploit the technology beyond the adoption of use cases (just one part of the UML). This book explains how, as an IT business analyst, you can pull together all of the UML tools... |
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |