Home | Amazing | Today | Tags | Publishers | Years | Search 
Sun Web Server: The Essential Guide
Sun Web Server: The Essential Guide

The authoritative, comprehensive guide to Sun Web Server 7.0

 

Sun Web Server is the secure web serving platform of choice for large-scale enterprises in industries from finance and telecommunications to travel and government. Now there’s a...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Oracle Performance Troubleshooting: With Dictionary Internals SQL & Tuning Scripts (Oracle In-Focus series)
Oracle Performance Troubleshooting: With Dictionary Internals SQL & Tuning Scripts (Oracle In-Focus series)

More than ever before, today's Oracle DBA faces a database farm that is growing both in physical size and actual numbers. To keep these databases up and performing at exceptional levels, the database administrator needs more than a cobbled together set of scripts that they use to (hopefully) verify that everything is in order.

...

Windows® 7 Administrator's Pocket Consultant
Windows® 7 Administrator's Pocket Consultant

Writing Windows 7 Administrator’s Pocket Consultant was a lot of fun—and a lot of work. As I set out to write this book, my initial goals were to determine how Windows 7 was different from Windows Vista and Windows XP and what new administration options were available. As with any new operating system—but especially with...

Managing Software Debt: Building for Inevitable Change
Managing Software Debt: Building for Inevitable Change

Shipping imperfect software is like going into debt. When you incur debt, the illusion of doing things faster can lead to exponential growth in the cost of maintaining software. Software debt takes five major forms: technical, quality, configuration management, design, and platform experience. In today’s rush to market, software debt is...

JQuery UI Themes Beginner's Guide
JQuery UI Themes Beginner's Guide

Welcome to jQuery UI Themes: Beginner's Guide. This introductory text will get you started with developing your own themes for jQuery UI applications. Starting with the general concepts of user interface themes, this book walks the reader through everything from the most basic ideas in jQuery UI to more advanced topics such as icons...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Sinatra: Up and Running
Sinatra: Up and Running

When people speak of Ruby web development, it has historically been in reference to the opinionated juggernaut that is Rails. This is certainly not an unfounded association; Hulu, Yellow Pages, Twitter, and countless others have relied on Rails to power their (often massive) web presences, and Rails facilitates that process with zeal....

OS X and iOS Kernel Programming
OS X and iOS Kernel Programming
Kernel development can be a daunting task and is very different from programming traditional user applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to ensure that kernel code is free of bugs because any issue may have serious consequences to the stability, security, and performance...
High Performance MySQL: Optimization, Backups, and Replication
High Performance MySQL: Optimization, Backups, and Replication
We wrote this book to serve the needs of not just the MySQL application developer but also the MySQL database administrator. We assume that you are already relatively experienced with MySQL. We also assume some experience with general system administration, networking, and Unix-like operating systems.

The second edition of
...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
iOS Hacker's Handbook
iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy