Home | Amazing | Today | Tags | Publishers | Years | Search 
Instant Microsoft Forefront UAG Mobile Configuration Starter
Instant Microsoft Forefront UAG Mobile Configuration Starter

UAG provides your employees, clients, or partners secure remote access to your vital corporate resources, while delivering a seamless integration with your existing network environment. UAG is able to optimize content for different mobile devices, and is also able to publish complex applications in a simple manner. You are also able to...

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it...

Windows Vista Deployment
Windows Vista Deployment

Mit der Einführung von Windows Vista hat Microsoft den Prozess der Installation und Bereitstellung des Betriebssystems signifikant umgestellt.Hardware- und sprachneutrale Abbilder (Images), neue Tools zur individuellen Anpassung der Bereitstellung und XML-basierte Antwortdateien erlauben Ihnen eine individuelle Anpassung von Windows...

Linux System Administration Recipes: A Problem-Solution Approach
Linux System Administration Recipes: A Problem-Solution Approach

The job of Linux systems administrator is interrupt-driven and requires constant learning in byte-wise chunks. This book gives solutions to modern problems, even some you might not have heard of, such as scripting LDAP, making Mac clients play nice with Linux servers, and backup, security, and recovery scripts. Author Juliet Kemp takes a broad...

Linux For Dummies, 9th Edition
Linux For Dummies, 9th Edition
Welcome to the fascinating world of open-source software that is Linux. In this book, we introduce you to the wonders of the Linux operating system, originally created as a labor of love by Linus Torvalds in the early 1990s. Our goal is to initiate you into the rapidly growing ranks of Linux users and enthusiasts busily rewriting the rules for the...
The Least Worst Place - How Guantanamo Became the World’s Most Notorious Prison
The Least Worst Place - How Guantanamo Became the World’s Most Notorious Prison
The prisoner’s cry pierced through the hot Caribbean air. It was not the first time that such a shriek had roused the rest of the detainees from their daily lethargy. But this time it brought them to their feet and unleashed a flurry of noise, as they pounded the cement floors and rattled the wire mesh of their cells. An invisible force...
Linux Recipes for Oracle DBAs (Recipes: a Problem-Solution Approach)
Linux Recipes for Oracle DBAs (Recipes: a Problem-Solution Approach)

Linux Recipes for Oracle DBAs is an example–based book on managing Oracle Database in a Linux environment. Covering commonly used distributions such as Red Hat Enterprise Linux and Oracle Enterprise Linux, the book is written for database administrators who need to get work done and lack the luxury of curling up fireside with a...

Photoshop CS3 Bible
Photoshop CS3 Bible
Get the book you need to succeed in any Photoshop endeavor -- Photoshop CS3 Bible. In this totally updated edition to the international bestseller, the authors show you how to master every aspect of Photoshop -- from image-editing basics to new techniques for working with camera raw images. You'll learn how to retouch, color correct,...
Seam Framework: Experience the Evolution of Java EE (2nd Edition) (JBoss Series)
Seam Framework: Experience the Evolution of Java EE (2nd Edition) (JBoss Series)
Fully Updated to Cover Major Enhancements to Seam 2.x

 

In Seam Framework, Second Edition, the authors of the leading guide to Seam programming have systematically updated their text to reflect the major improvements introduced...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Linux Administration Handbook (2nd Edition)
Linux Administration Handbook (2nd Edition)
As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a...
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy