Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Literacy: Tools and Methodologies for Information Society
Digital Literacy: Tools and Methodologies for Information Society
Currently in a state of cultural transition, global society is moving from a literary society to digital one, adopting widespread use of advanced technologies such as the Internet and mobile devices. Digital media has an extraordinary impact on society s formative processes, forcing a pragmatic shift in their management and organization....
Adobe Acrobat 9 PDF Bible
Adobe Acrobat 9 PDF Bible
" The Adobe Acrobat 9 PDF Bible is the comprehensive guide to Acrobat for novices and power users alike. With its concise, easy-to-read format, this book will have you creating interactive XML forms, enabling streamlined document review processes, and publishing high-impact electronic documents in no time."

— Rick...

Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Qmail Quickstarter: Install, Set Up and Run your own Email Server
Qmail Quickstarter: Install, Set Up and Run your own Email Server

A fast-paced and easy-to-follow, step-by-step guide that gets you up and running quickly

  • Qmail Basics
  • Storing and retrieving of emails
  • Virtualisation
  • Filtering Spam
  • Hosting Multiple Domains, Encryption, and Mailing Lists

In Detail

This book...

Java Network Programming, Third Edition
Java Network Programming, Third Edition

Java's growth over the last 10 years has been nothing short of phenomenal. Given Java's rapid rise to prominence and the even more spectacular growth of the Internet, it's a little surprising that network programming in Java is still so mysterious to so many. It doesn't have to be. In fact, writing network programs in Java...

Getting Started with Your Mac and Mac OS X Tiger : Peachpit Learning Series
Getting Started with Your Mac and Mac OS X Tiger : Peachpit Learning Series

You bought your Mac OS X Tiger computer because you thought it would be easy to use-and it is! But if you've never used a computer before, never stared at a graphical user interface or clicked an icon to launch a program or open a file, getting going with your new machine can still be a daunting proposition. With this guide from...

CSS Instant Results (Programmer to Programmer)
CSS Instant Results (Programmer to Programmer)
With the latest generation of modern browsers expanding support for CSS 3, it is an exciting time in the CSS world. Featuring ten ready-to-use projects on the book's CD-ROM, this helpful reference dives into working code so you can rapidly master the increasingly diverse applications web designers can use with CSS, including some that previously...
Understanding .NET: A Tutorial and Analysis
Understanding .NET: A Tutorial and Analysis

Microsoft's .NET is a collection of new technologies that are revolutionizing Windows-based software development. A major theme of .NET is the idea of Web services, allowing software to communicate directly with other software using Internet technologies. The .NET Framework and Visual Studio.NET, two more core aspects of this initiative, provide...

Microsoft(r) Windows(r) 2000 Server Administrator's Companion
Microsoft(r) Windows(r) 2000 Server Administrator's Companion
MICROSOFT WINDOWS 2000 SERVER ADMINISTRATOR'S COMPANION brings network administrators, systems engineers, and other MIS professionals up to speed on the latest features of Windows 2000 Server, including Active Directory(tm) services, Microsoft Internet Information Server 4.0, the new, integrated console for administrative tools, and more. It's the...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Cisco ISP Essentials
Cisco ISP Essentials
A comprehensive guide to the best common practices for Internet service providersLearn the best common practices for configuring routers on the Internet from experts who helped build the InternetGain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS SoftwareUnderstand the Cisco IOS tools essential...
IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

unlimited object storage image
Result Page: 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy