|
|
|
|
JavaScript & DHTML CookbookOn numerous online forums for JavaScript and DHTML, the majority of questions begin with "How do I...?" This new Cookbook provides the answers with a comprehensive collection of problems, solutions, and practical examples. The book's recipes range from simple tasks, such as manipulating strings and validating dates in JavaScript, to... | | | | Mastering Red Hat Linux 9Whether you depend on Linux as a server or desktop OS, Mastering Red Hat Linux 9 gives you the practical information you need to install, configure, and administer the latest version of Red Hat’s operating system to suit your specific computing needs. Clear, step-by-step instruction teaches you basic, intermediate, and... |
|
|
SUSE Linux 10 For Dummies (Computer/Tech)SUSE Linux is an increasingly popular Linux distribution that competes headon with Red Hat’s Linux versions. SUSE Linux’s fortunes have been on the rise following Novell’s acquisition of Germany’s SUSE Linux AG and the recent initiation of the openSUSE project (www.opensuse.org) — an open source ... | | Linux For Dummies, 7th EditionUse the DVD to sample Linux without installing
Pick a flavor and see what this stable, economical operating system can do!
If you've ever wondered whether the Linux penguin knew something you should know, here's where to find out. This plain-English guide walks you through... | | Guide to UNIX Using Linux (Networking)
Guide to UNIX Using Linux, Fourth Edition is updated to include new UNIX/Linux distributions,
networking utilities, new UNIX/Linux capabilities, and coverage of both the
GNOME and KDE desktops.The large array of commands, utilities, file systems, and other
information you learn here applies to any Linux system and most UNIX... |
|
| | Hacking a Terror Network: The Silent Threat of Covert ChannelsFrom a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of... | | Securing & Optimizing Linux: A Hands on Guide for Linux ProfessionalsThis book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |