Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
JNCIE: Juniper Networks Certified Internet Expert Study Guide
JNCIE: Juniper Networks Certified Internet Expert Study Guide
Greetings and welcome to the world of Juniper Networks. This introductory section serves
as a location to pass on to you some pertinent information concerning the Juniper Networks
Technical Certification Program. In addition, you’ll find information about how the book itself
is laid out and what it contains. Finally,
...
The Complete Idiot's Guide to Microsoft Windows 7
The Complete Idiot's Guide to Microsoft Windows 7

For Windows(r) users, 7 might just be their lucky number

This guide offers a smoother transition for users moving from an older version to Windows(r) 7. Along with simple step-by-step instructions and numerous useful examples, readers will learn how to: use new tools; find applications and files instantly;
...

CCSE NG: Check Point Certified Security Expert Study Guide
CCSE NG: Check Point Certified Security Expert Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Beginning Fedora 2
Beginning Fedora 2

Beginning Fedora 2 teaches you everything you need to know in order to install, configure, use, and maintain Fedora. This book targeted primarily at readers who are using (or planning to use) the Fedora Linux operating system for the first time. It offers the simple, plain-speaking guidance you need as you begin to explore the vast...

Microsoft SQL Azure Enterprise Application Development
Microsoft SQL Azure Enterprise Application Development

SQL Azure is a database service in the cloud. Based on Microsoft's Windows Azure platform, SQL Azure is well suited for web facing database applications. Are you interested in moving your business applications and data to the cloud but are not sure how to go about it? Look no further; this book covers all you ever wanted to know about...

Getting Started with Windows Server Security
Getting Started with Windows Server Security

Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

About This Book

  • Learn how to identify and mitigate security risks in your Microsoft Server infrastructure
  • Develop a proactive approach to common security threats to prevent sensitive data...
Linux Toys II: 9 Cool New Projects for Home, Office, and Entertainment (ExtremeTech)
Linux Toys II: 9 Cool New Projects for Home, Office, and Entertainment (ExtremeTech)
The Linux toyshop just added a new wing

Tired of playing with your old Linux toys? Wait 'til you see what Chris Negus has cooked up for you now! How about a Web-based Gallery server for sharing digital images over a network? A slick MythTV personal video recorder entertainment center? Automating gadgets and home lighting with X10? Or recycling...

Upgrading and Fixing Computers Do-it-Yourself For Dummies
Upgrading and Fixing Computers Do-it-Yourself For Dummies

You’re no dummy; we both know that. But something about computers often makes you feel like a dummy. And that’s perfectly understandable. Unlike today’s kids, you probably didn’t grow up with a computer in your kindergarten class, car, or in your back pocket. With this book, you’ll no longer feel uncomfortable...

Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
The Concise Guide to DNS and BIND
The Concise Guide to DNS and BIND
The Concise Guide to DNS and BIND provides the technical depth and expert-level information needed to understand and administer DNS and BIND. Domain Name System (DNS) is a distributed Internet directory service. It is used mainly to translate between domain names and IP addresses, and to control Internet email...
Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Covers Release Candidate of Windows 7. 

With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.

 

Microsoft® Windows 7 Unleashed...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy