Home | Amazing | Today | Tags | Publishers | Years | Search 
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide
Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide

Massive, disruptive change is coming to IT as Software as a Service (SaaS), SOA, mashups, Web 2.0, and cloud computing truly come of age. Now, one of the world’s leading IT innovators explains what it all means—coherently, thoroughly, and authoritatively.

Writing for IT executives, architects, and developers
...

Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Nmap Cookbook: The Fat-free Guide to Network Scanning
Nmap Cookbook: The Fat-free Guide to Network Scanning

Nmap(r) Cookbook: The fat-free guide to network scanning provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results. Topics covered include: * Installation on Windows, Mac...

Practical Guide to Ubuntu Linux, A (3rd Edition)
Practical Guide to Ubuntu Linux, A (3rd Edition)

The Most Complete, Easy-to-Follow Guide to Ubuntu Linux

  • The #1 Ubuntu server resource, fully updated for Ubuntu 10.4 (Lucid Lynx)–the Long Term Support (LTS) release many companies will rely on for years!
Ubuntu Unleashed 2011 Edition: Covering 10.10 and 11.04 (6th Edition)
Ubuntu Unleashed 2011 Edition: Covering 10.10 and 11.04 (6th Edition)

We are pleased to present the 2011 edition of Ubuntu Unleashed. Ubuntu is a Linux-based computer operating system that has taken the world by storm. From its humble beginning in 2004, Ubuntu has risen to be the vanguard of desktop Linux, as well as a popular choice for servers.

 

...
Microsoft SQL Azure Enterprise Application Development
Microsoft SQL Azure Enterprise Application Development

SQL Azure is a database service in the cloud. Based on Microsoft's Windows Azure platform, SQL Azure is well suited for web facing database applications. Are you interested in moving your business applications and data to the cloud but are not sure how to go about it? Look no further; this book covers all you ever wanted to know about...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Upgrading and Fixing Computers Do-it-Yourself For Dummies
Upgrading and Fixing Computers Do-it-Yourself For Dummies

You’re no dummy; we both know that. But something about computers often makes you feel like a dummy. And that’s perfectly understandable. Unlike today’s kids, you probably didn’t grow up with a computer in your kindergarten class, car, or in your back pocket. With this book, you’ll no longer feel uncomfortable...

Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook (2nd Edition)

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series...

How to Do Everything Netbook
How to Do Everything Netbook

Get the most out of your netbook!

Now that you've got a netbook, it's time to find out how to maximize all of its capabilities. This hands-on guide explains how you can keep your netbook running at peak performance by limiting how many programs you run concurrently and what you download. Learn the best ways to connect to...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy