Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
Alfresco 3 Enterprise Content Management Implementation
Alfresco 3 Enterprise Content Management Implementation

How to customize, use, and administer this powerful, Open Source Java-based Enterprise CMS

  • Manage your business documents with version control, library services, content organization, and advanced search.
  • Create collaborative web sites using document libraries, wikis, blogs, forums, calendars, discussions,...
Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)
iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)

In case you haven’t heard, the digital camera market is exploding. At this point, a staggering 98 percent of cameras sold are digital cameras. It’s taken a few decades—the underlying technology used in most digital cameras was invented in 1969—but film photography has been reduced to a niche activity.

...

Numerical Simulations and Case Studies Using Visual C++.Net
Numerical Simulations and Case Studies Using Visual C++.Net
Master the numerical simulation process required to design, test and support mobile and parallel computing systems. An accompanying ftp site contains all the Visual C++ based programs discussed in the text to help readers create their own programs. With its focus on problems and solutions, this is an excellent text for upper-level undergraduate and...
Pro BizTalk 2009
Pro BizTalk 2009

In the beginning, when BizTalk was still in its infancy, there were two teams within Microsoft: the Commerce Server Team and the COM+ team. The Commerce Server Team was implementing technology it called Commerce Server Messaging Pipelines, which was essentially software that allowed applications to move messages from one system to another...

Linux Ethernet Howto
Linux Ethernet Howto
The Linux Ethernet-HOWTO is a compilation of information about which Ethernet devices can be used for Linux, and how to set them up. This HOWTO is focused on the hardware and low-level driver aspect of the Ethernet cards, and does not cover the software end of things like ifconfig and route (this material is covered in the Network HOWTO).
...
Medical Image Analysis
Medical Image Analysis

The expanded and revised edition will split Chapter 4 to include more details and examples in FMRI, DTI, and DWI for MR image modalities. The book will also expand ultrasound imaging to 3-D dynamic contrast ultrasound imaging in a separate chapter.

A new chapter on Optical Imaging Modalities elaborating microscopy, confocal...

RHCE - RH302 Red Hat Certified Engineer Certification Exam Preparation Course in a Book for Passing the RHCE
RHCE - RH302 Red Hat Certified Engineer Certification Exam Preparation Course in a Book for Passing the RHCE

This self-study exam preparation guide for the RHCE - RH302 Red Hat Certified Engineer exam contains everything you need to test yourself and pass the Exam. Including all the exam topics, covered indepth and insider secrets, complete explanations of all RHCE subjects, test tricks and tips, over 250 highly realistic sample questions, and...

Expert Oracle GoldenGate
Expert Oracle GoldenGate

Oracle Corporation acquired GoldenGate in 2009 as part of future strategy to implement advanced replication technologies within the product suite of data warehousing and real-time transaction management. Before the advent of Oracle GoldenGate technology, data replication was performed using Oracle Streams and third-party replication...

Readings in Multimedia Computing and Networking (The Morgan Kaufmann Series in Multimedia Information and Systems)
Readings in Multimedia Computing and Networking (The Morgan Kaufmann Series in Multimedia Information and Systems)
READINGS in Multimedia Computing is a collection of seminal research papers culled from the literature of the last ten years. Although the origins of multimedia computing and networking can be traced back to the development of systems such as the AT&T Picturephone in the late 1960s, it wasn't until the 1990s that the field came into its own....
sed & awk (2nd Edition)
sed & awk (2nd Edition)
The book begins with an overview and a tutorial that demonstrate a progression in functionality from grep to sed to awk. sed and awk share a similar command-line syntax, accepting user instructions in the form of a script. Because all three programs use UNIX regular expressions, an entire chapter is devoted to understanding UNIX regular expression...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy