 |
|
|
 Ubuntu: The Complete Reference (Complete Reference Series)The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS
Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up... |  |  Windows Server 2008 BibleMoving to Windows Server 2008? Start with this book.
Windows Server 2008 has arrived with many new features and choices, and this hands-on reference shows you how to handle them all. Whether you're starting from scratch or upgrading, you'll find a wealth of information on how to install, configure, manage, and... |  |  CompTIA Security+ All-in-One Exam Guide, Second EditionA CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One
Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of... |
|
 Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.
A comprehensive guide to Spring Security 3. You will learn... |  |  A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.
As the... |  |  |
|
|
Result Page: 4 3 2 1 |