 |
|
|
 |  |  Unix Unleashed (4th Edition)Using Solaris 8 and Linux 7.1 as their reference flavors, Robin Anderson and Andy Johnston (as well as a slew of contributors) show how to be a system administrator--and get all sorts of other work done--in the fourth edition of Unix Unleashed. Significantly different from its predecessors, this book stays generally clear of very basic... |  |  |
|
 Citrix XenApp Platinum Edition for Windows: The Official GuideThe Authorized Guide to Citrix XenApp Platinum Edition for Windows
Design, deploy, and maintain a virtualized, on-demand enterprise application delivery infrastructure. Citrix XenApp Platinum Edition for Windows: The Official Guide explains how to ensure high availability, enhance productivity, and reduce costs... |  |  Networking (2nd Edition) (Networking Technology)This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical... |  |  PC Magazine Fighting Spyware, Viruses, and MalwareThink there's no malicious software on your computer? PC Magazine thinks you should think again.
Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by... |
|
 The Complete Idiot's Guide to Creating Your Own CDs (2nd Edition)CD-ROM "burners" are a standard feature on many new PCs. This title provides expert advice on creating CD-ROMs in an easy to comprehend language. Topics covered include: CD burning troubleshooting, copyright and format issues. --This text refers to an out of print or unavailable edition of this title.
... |  |  Securing & Optimizing Linux: The Hacking SolutionThis 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system... |  |  |
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 |