Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Red Hat Linux Fedora for Dummies
Red Hat Linux Fedora for Dummies
This handy guide helps you work with Fedora by walking you through installing and configuring the OS, getting online, building a firewall, using Windows applications with Wine, tuning in with MPlayer, and much more.

Configure broadband Internet connections, work with OpenOffice.org, and more. Red Hat has merged its flagship Red Hat Linux...

MCTS Self-Paced Training Kit (Exam 70-620): Configuring Windows Vista(TM) Client (Self Paced Training Kit 70-620)
MCTS Self-Paced Training Kit (Exam 70-620): Configuring Windows Vista(TM) Client (Self Paced Training Kit 70-620)

Ace your preparation for the skills measured by MCTS Exam 70-620-and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying your knowledge to real-world case scenarios and practice exercises. This official Microsoft study guide is...

Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Securing PHP Web Applications
Securing PHP Web Applications
If you’re reading this, we know two things about you: First, you write PHP applications that run online. Second, you’re not a hard-core security guru. In fact, you’re probably holding this book right now because other security books left you with more questions than you started with, or because this is the first time you’ve...
Windows 10 Troubleshooting (Windows Troubleshooting Series)
Windows 10 Troubleshooting (Windows Troubleshooting Series)

Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...

Instant Netcat Starter
Instant Netcat Starter

As a featured networking utility, Netcat uses TCP/IP protocols to read and write data across network connections. Netcat is a feature rich backend network debugging and exploration tool with the ability to create almost any type of connection you would need.

"Instant Netcat Starter Guide" is a practical, hands-on guide...

Linux Administration: A Beginner's Guide, Fifth Edition
Linux Administration: A Beginner's Guide, Fifth Edition
Administering a Linux system isn't much like administering a Windows machine. Though the goals are similar and comparable problems arise under both environments, they each require administrators to adopt a certain way of thinking about processes and data. Linux Administration: A Beginner's Guide helps readers adapt their Windows experience...
Fedora Linux Servers with systemd: second edition
Fedora Linux Servers with systemd: second edition

This book is designed as a server reference for Fedora Linux with systemd. This second edition covers Fedora Linux 23. Administration tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to know to perform key networking and server tasks. Topics covered...

CCSP CSPFA Exam Cram 2 (Exam Cram 642-521)
CCSP CSPFA Exam Cram 2 (Exam Cram 642-521)

The Exam Cram Method of study focuses on exactly what you need to get certified now.

Welcome to CSPFA Exam Cram 2 (642-521)! Whether this is your 1st or 15th Exam Cram 2 series book, you'll find information here that will help ensure your success as you pursue knowledge, experience, and
...
Mission Critical Internet Security
Mission Critical Internet Security
The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy