Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Getting Started with Red Hat Enterprise Virtualization
Getting Started with Red Hat Enterprise Virtualization

Leverage powerful Red Hat Enterprise Virtualization solutions to build your own IaaS cloud

About This Book

  • Build an agile, secure, and highly scalable virtualization foundation for your enterprise Linux and Windows workloads
  • Explore how Red Hat Enterprise Virtualization positions itself...
Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

DevOps for SharePoint: With Packer, Terraform, Ansible, and Vagrant
DevOps for SharePoint: With Packer, Terraform, Ansible, and Vagrant
Deploy a SharePoint farm in a repeatable, predictable, and reliable fashion using Infrastructure as Code (IaC) techniques to automate provisioning. Savvy IT pros will learn how to use DevOps practices and open source tools to greatly reduce costs, and streamline management operations for SharePoint farms deployed via Amazon Web Services...
Linux For Dummies 8th Edition
Linux For Dummies 8th Edition

Everything you need to install, run, and optimize Linux on your desktop

Here's how to start using Linux, the popular and free operating system

Want to do the same tasks you can with Windows, except for free? Linux is the alternative open source operating system that's beloved by users...

LPI Linux Certification in a Nutshell
LPI Linux Certification in a Nutshell

Objective certification of professionals is a time-honored tradition in many fields, including medicine and law. As small computer systems and networks proliferated over the last decade, Novell and Microsoft produced extremely popular certification products for their respective operating system and network technologies. These...

Microsoft SharePoint 2010: Building Solutions for SharePoint 2010
Microsoft SharePoint 2010: Building Solutions for SharePoint 2010

This book provides a fresh take on Microsoft’s premier collaboration solution. A critical resource if you’re developing on the SharePoint platform, this book features a complete focus on the new features and capabilities of SharePoint 2010. Through a thorough treatment of sites, web parts, data management, portal solutions, and...

E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Understanding PaaS
Understanding PaaS

The least understood feature of cloud computing, Platform as a Service (PaaS), is also the most powerful and cost effective. This concise overview shows you why organizations that properly wield PaaS can quickly gain a strong competitive advantage. You’ll learn how PaaS enables developers to pursue low cost R&D projects,...

Linux Toys II: 9 Cool New Projects for Home, Office, and Entertainment (ExtremeTech)
Linux Toys II: 9 Cool New Projects for Home, Office, and Entertainment (ExtremeTech)
The Linux toyshop just added a new wing

Tired of playing with your old Linux toys? Wait 'til you see what Chris Negus has cooked up for you now! How about a Web-based Gallery server for sharing digital images over a network? A slick MythTV personal video recorder entertainment center? Automating gadgets and home lighting with X10? Or recycling...

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
BSD UNIX Toolbox: 1000+ Commands for FreeBSD, OpenBSD and NetBSD
BSD UNIX Toolbox: 1000+ Commands for FreeBSD, OpenBSD and NetBSD
Explore a ton of powerful BSD UNIX commands

This handy, compact guide teaches you to use BSD UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to use and...

Computational Physics
Computational Physics
Computational physics book that emphasizes the physics that can be done with numerical/computational methods rather than just the methods themselves. Uses True Basic. (Representative programs on WWW). Praised for its coverage of many interesting topics in pure and applied physics.

From the Publisher
...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy