Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networking All-in-One Desk Reference For Dummies (Computer/Tech)
Networking All-in-One Desk Reference For Dummies (Computer/Tech)
Covers all Windows® XP service packs and Fedora Linux®

Your one-stop guide to building and managing a business or home network

Why take up a whole shelf with networking books when all the essentials are right here in one handy volume? Here's how to put a network together, choose the hardware and software, set up a server,...

E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Networking: A Beginner's Guide (Network Professional's Library)
Networking: A Beginner's Guide (Network Professional's Library)

Essential Skills--Made Easy!

Get a solid introduction to networking with this hands-on guide. You'll get all the core information you need to get started--including design and configuration, hardware, networking protocols, remote access, and security--plus, you'll find blueprints that map out network topologies and the OSI networking...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Sams Teach Yourself Microsoft Windows XP in 21 Days
Sams Teach Yourself Microsoft Windows XP in 21 Days
John guides the reader through the new and unfamiliar Windows interface, while introducing the new features. The book provides information in several formats, all integrated with theory, tutorials, procedures, tips and comprehensive.

Topics range from:* Installation of Windows XP* Whether to upgrade and if so, how to do it* Configuring services...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Solaris 10 : The Complete Reference
Solaris 10 : The Complete Reference
The Ultimate Resource on Solaris 10. Includes full details on all the new features.

Maximize all the capabilities of Sun Microsystems' FREE, innovative, and powerful UNIX-based operating system with help from this authoritative guide. Get full details on installation, process and device management, access control and...

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Building a Monitoring Infrastructure with Nagios
Building a Monitoring Infrastructure with Nagios
Build real-world, end-to-end network monitoring solutions with Nagios

 

This is the definitive guide to building low-cost, enterprise-strength monitoring infrastructures with Nagios, the world’s leading open source monitoring tool. Network monitoring specialist David...

Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Unix Unleashed (4th Edition)
Unix Unleashed (4th Edition)
Using Solaris 8 and Linux 7.1 as their reference flavors, Robin Anderson and Andy Johnston (as well as a slew of contributors) show how to be a system administrator--and get all sorts of other work done--in the fourth edition of Unix Unleashed. Significantly different from its predecessors, this book stays generally clear of very basic...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy