Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Configuring IPv6 for Cisco IOS
Configuring IPv6 for Cisco IOS
Configuring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting...
Red Hat Fedora Linux Secrets
Red Hat Fedora Linux Secrets
Learn how to release the full potential of Red Hat Fedora Linux and install the latest release of Fedora Core (FC4) with this comprehensive guide. Within these pages, you'll be privy to valuable secrets contained in FC4: yum, up2date, mandatory access control with Security Enhanced Linux, and improved device handling with udev. You'll go behind the...
XML and Java: Developing Web Applications
XML and Java: Developing Web Applications

XML and Java: Developing Web Applications is a tutorial that will teach Web developers, programmers, and system engineers how to create robust XML business applications for the Internet using the Java technology. The authors, a team of IBM XML experts, introduce the essentials of XML and Java development, from a review of basic concepts to...

C# Class Design Handbook: Coding Effective Classes
C# Class Design Handbook: Coding Effective Classes

The mission of the C# Class Design Handbook is to provide you with a critical understanding of designing classes, making you better equipped to take full advantage of C#’s power to create robust, flexible, reusable classes. This comprehensive guide lifts the lid on syntax and examines what’s really going on behind the...

Lotus Notes Domino 8: Upgrader's Guide
Lotus Notes Domino 8: Upgrader's Guide
Written by senior architects and specialists of IBM Software Services for Lotus, this book for power users, administrators, and developers working with any version of Lotus Notes/Domino who want to upgrade is a complete guide to the most powerful new features and changes in Lotus Notes/Domino 8. It walks through the new features in the Lotus...
Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
The convergence of computing and communications has been predicted for many years. Today's explosion of a myriad of new types of personal computing and communications devices—notebook computers, personal digital assistants, "smart" phones, two-way pagers, digital cameras and so on—has resulted in new ways for people to...
How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
CompTIA A+ Exam Prep (Exams A+ Essentials, 220-602, 220-603, 220-604)
CompTIA A+ Exam Prep (Exams A+ Essentials, 220-602, 220-603, 220-604)
This book covers every skill measured by the latest A+ Exams including:
  • Understanding all essential PC terminology, concepts, internal components, and peripherals
  • Installing, upgrading, configuring, and optimizing PC components
  • Troubleshooting hardware and performing essential preventive maintenance
  • ...
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
An organized, methodical, real-world approach to the complex process of information technology outsourcing.

McDonnell Douglas, Delta, Lufthansa, Hughes Electronics, Hertz, Chase Manhattan, Herman's Sporting Goods, John Wiley & Sons, Proctor & Gamble ... these are just a few of the hundreds of companies that have...

Database Modeling and Design: Logical Design, 4th Edition (Data Management Systems)
Database Modeling and Design: Logical Design, 4th Edition (Data Management Systems)
Database systems and database design technology have undergone significant evolution in recent years. The relational data model and relational database systems dominate business applications; in turn, they are extended by other technologies like data warehousing, OLAP, and data mining. How do you model and design your database application in...
Grid Computing For Developers (Programming Series)
Grid Computing For Developers (Programming Series)
Learn the Future of Computing Today!

Many industry analysts believe that Grid computing will be the next big wave in technology. It is so promising that major technology companies such as IBN, Microsoft, Oracle, and Sun are allocating significant quantities of resources for Grid research and development. A Developer’s Guide to Grid...

unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy