Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Here we have a comprehensive, problem-oriented, engineering perspective on the uses of neural nets, fuzzy systems, and hybrids that emphasizes practical solutions to everyday artificial intelligence (AI) problems over abstract theoretical noodling. Intended for upper-division students and postgraduates who need a...
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Learn how to solve complex differential equations using MATLAB®

Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB® teaches readers how to numerically solve both ordinary and partial differential equations with ease. This innovative publication brings together a skillful treatment of MATLAB...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

Dreamweaver MX 2004 Web Application Recipes
Dreamweaver MX 2004 Web Application Recipes
Why reinvent the wheel every time you design a new Web site? With this book, you don't have to. By providing real-world recipes for building dynamic Web applications using Dreamweaver with ASP, ColdFusion, or PHP, this book shows you how to save time and money while focusing on the things that make your site unique. In these pages, a trio of...
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Rust Programming By Example: Enter the world of Rust by building engaging, concurrent, reactive, and robust applications
Rust Programming By Example: Enter the world of Rust by building engaging, concurrent, reactive, and robust applications

Discover the world of Rust programming through real-world examples

Key Features

  • Implement various features of Rust to build blazingly fast applications
  • Learn to build GUI applications using Gtk-rs
  • Explore the multi-threading aspect of Rust to tackle...
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Maximize the powerful capabilities of Red Hat Enterprise and Fedora Linux using this
comprehensive and up-to-date reference. You'll get full details on everything from installation and
configuration to system administration and server management of Enterprise Linux-with specifics
on the Linux Kernel 2.6. Thorough security coverage
...
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy