Home | Amazing | Today | Tags | Publishers | Years | Search 
Brute Force: Cracking the Data Encryption Standard
Brute Force: Cracking the Data Encryption Standard
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved...
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
Essential SharePoint 2007: A Practical Guide for Users, Administrators and Developers
Essential SharePoint 2007: A Practical Guide for Users, Administrators and Developers
If your business needs to control its documents, structure its workflow, or share information over the Web, you need SharePoint. It’s simply the quickest way to fill those needs using standard tools business users already know: Microsoft Office and Internet Explorer. Best of all, SharePoint is free (well, kind of); SharePoint Services are...
Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Open Source Web Site Construction Kit
Open Source Web Site Construction Kit
Gives readers a comprehensive survey of the best tools for building and maintaining Web sites. Author takes the reader through the process of thinking through and then building an open source Web site. Softcover.

This book gives readers a comprehensive survey of the best tools for building and maintaining Web sites. In a
...
Ubuntu Unleashed 2008 Edition: Covering 8.04 and 8.10 (4th Edition)
Ubuntu Unleashed 2008 Edition: Covering 8.04 and 8.10 (4th Edition)
Ubuntu Unleashed 2008 Edition presents comprehensive coverage of the popular Ubuntu Linux distribution. Windows users, Mac users, and Linux enthusiasts have been increasingly turning to Ubuntu for a user-friendly, easy-to-use Linux distribution.

This book provides detailed information on installing, using, and administering Ubuntu....

Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
The Best Fully Integrated Study System Available for Exam LPI 199

With hundreds of practice questions and hands-on exercises, Ubuntu Certified Professional Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.

  • 100% complete coverage of all official...
Deploying LINUX on the Desktop
Deploying LINUX on the Desktop
Covering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!

Looking at the world of the
...
Red Hat Fedora Linux 3 For Dummies
Red Hat Fedora Linux 3 For Dummies
Get online with broadband DSL and build Web pages

Install Fedora Core 3, use OpenOffice.org, play CDs, and set up a firewall

The penguin is back, and better than ever! And this friendly guide will help you install and configure the new edition of Fedora Core so you can use exciting features like the SELinux infrastructure, which...

JRuby Cookbook
JRuby Cookbook
If you're interested in JRuby, you probably don't need a turorial on Ruby, Rails, or Java -- you just need to know how to get things done. This Cookbook offers practical solutions for using the Java implementation of the Ruby language, with targeted recipes for deploying Rails web applications on Java servers, integrating JRuby code with Java...
Computational Physics
Computational Physics
Computational physics book that emphasizes the physics that can be done with numerical/computational methods rather than just the methods themselves. Uses True Basic. (Representative programs on WWW). Praised for its coverage of many interesting topics in pure and applied physics.

From the Publisher
...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy