 |
|
|
 IT Disaster Recovery Planning For Dummies (Computer/Tech)Create a safety net while you work out your major plan
Identify critical IT systems, develop a long-range strategy, and train your people
Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back... |  |  Maximum Linux Security (2nd Edition)Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.
Maximum Linux Security helps Linux administrators identify and plug security holes... |  |  Hacking BlackBerry: ExtremeTechHere's an even better way to get your BlackBerry fix
Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or... |
|
 Dojo: The Definitive GuideOf all the Ajax-specific frameworks that have popped up in recent years, one clearly stands out as the industrial strength solution. Dojo is not just another JavaScript toolkit -- it's the JavaScript toolkit -- and Dojo: The Definitive Guide demonstrates how to tame Dojo's extensive library of utilities so that you can build rich and responsive web... |  |  Building Embedded Linux SystemsThere's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux. ... |  |  The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... |
|
 Hacking Mac OS X Tiger : Serious Hacks, Mods and CustomizationsThis serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:
- Shows you how to speed it up, lock it down, or pull back the curtains.
- Dives into default system settings,...
|  |  Hacking iPod and iTunes (ExtremeTech)How to Mod The Pod and fine-tune iTunes
Does your iPod go wherever you do? This book will take the two of you on your most exciting adventure–deep into iPod’s awesome potential. You already know it’s a musical prodigy, but wait 'til you teach your iPod to take notes, give you the weather and stock quotes, keep your... |  |  Maximum Windows 2000 Security (Maximum Security)Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.
Topics include:
Physical & File System Security,
Password Security,
Malicious Code,
Windows 2000 Network Security Architecture and Professional... |
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |