Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
JavaScript & DHTML Cookbook
JavaScript & DHTML Cookbook
On numerous online forums for JavaScript and DHTML, the majority of questions begin with "How do I...?" This new Cookbook provides the answers with a comprehensive collection of problems, solutions, and practical examples. The book's recipes range from simple tasks, such as manipulating strings and validating dates in JavaScript, to...
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....

Mastering Red Hat Linux 9
Mastering Red Hat Linux 9

Whether you depend on Linux as a server or desktop OS, Mastering Red Hat Linux 9 gives you the practical information you need to install, configure, and administer the latest version of Red Hat’s operating system to suit your specific computing needs. Clear, step-by-step instruction teaches you basic, intermediate, and...

Mastering Red Hat Enterprise Linux 3
Mastering Red Hat Enterprise Linux 3
Your Complete Guide to the World’s Leading Linux Enterprise Distribution

Red Hat Enterprise Linux 3 is emerging as the corporate Linux standard. One of the first books to focus on this robust product, Mastering Red Hat Enterprise Linux 3 gives you the practical information you need to install, configure, and...

SELinux by Example: Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux

SELinux: Bring World-Class Security to Any Linux Environment!

 

SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure...

Dior (Fashion Memoir Series)
Dior (Fashion Memoir Series)

Darling of high society, creator of the "New Look", Dior shot to international fame almost overnight at the age of 47. At first his creations provoked angry accusations of unpatriotic extravagance, but women everywhere soon warmed to his hour-glass lines and long, rustling skirts. In this work, Dior's most characteristic designs...

SUSE Linux 10 For Dummies (Computer/Tech)
SUSE Linux 10 For Dummies (Computer/Tech)
SUSE Linux is an increasingly popular Linux distribution that competes headon
with Red Hat’s Linux versions. SUSE Linux’s fortunes have been on the
rise following Novell’s acquisition of Germany’s SUSE Linux AG and the recent
initiation of the openSUSE project (www.opensuse.org) — an open source...
Linux For Dummies, 7th Edition
Linux For Dummies, 7th Edition
Use the DVD to sample Linux without installing

Pick a flavor and see what this stable, economical operating system can do!

If you've ever wondered whether the Linux penguin knew something you should know, here's where to find out. This plain-English guide walks you through...

Guide to UNIX Using Linux (Networking)
Guide to UNIX Using Linux (Networking)

Guide to UNIX Using Linux, Fourth Edition is updated to include new UNIX/Linux distributions, networking utilities, new UNIX/Linux capabilities, and coverage of both the GNOME and KDE desktops.The large array of commands, utilities, file systems, and other information you learn here applies to any Linux system and most UNIX...

Linux Troubleshooting for System Administrators and Power Users (Hewlett-Packard Professional Books)
Linux Troubleshooting for System Administrators and Power Users (Hewlett-Packard Professional Books)

Linux is a fast-growing operating system with power and appeal, and enterprises worldwide are quickly adopting the system to utilize its benefits. But as with all operating systems, performance problems do occur causing system administrators to scramble into action. Finally, there is a complete reference for troubleshooting...

Hacking a Terror Network: The Silent Threat of Covert Channels
Hacking a Terror Network: The Silent Threat of Covert Channels
From a counterterrorism perspective, discovering terrorist communication networks
and methods is extremely important.Terrorists have demonstrated the
capability to exchange messages that vary from archaic (using human couriers)
to technologically advanced using “virtual dead-drops.”The popular press is full
of
...
Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy