Home | Amazing | Today | Tags | Publishers | Years | Search 
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
This redbook will help you install, tailor and configure the SuSE Linux 7.0 distribution on different servers of the xSeries and Netfinity class. You will be instructed on how to do the basic installation, and installing and configuring different services such as Apache (http-Server), Samba (Fileserver for Windows-based networks), and Postfix (an...
Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Linux Applications on Pseries
Linux Applications on Pseries
The strengths of the AIX operating system are well known among in the UNIX software community. Its reliability and great degree of scaling make AIX the perfect choice for hosting mission-critical applications. It is a robust and flexible operating system that meets all the requirements for the various demands of e-business environments. At the same...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
The Implementation (TCP/IP Illustrated, Volume 2)
The Implementation (TCP/IP Illustrated, Volume 2)

TCP/IP Illustrated, an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite.

TCP/IP Illustrated, Volume 2 contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

UNIX Unleashed: System Administrator's Edition
UNIX Unleashed: System Administrator's Edition
Master the Unix file systems and syntax as both a user and administrator with Unix Unleashed: System Administrator's Edition. Become an expert on the Unix system's organization, file storage, and essential commands. This large, comprehensive volume provides you with the fundamentals of system administration, including how to get around the...
Windows XP Registry: A Complete Guide to Customizing and Optimizing Windows XP
Windows XP Registry: A Complete Guide to Customizing and Optimizing Windows XP
Targeting IT professionals, system administrators, and experienced users moving to the Windows XP platform, this book enables the user to master registry concepts and architecture, provides a historical overview of the registry, and outlines the differences between Windows 9x/ME and Windows NT/2000/XP registries. Special attention is drawn to the...
Virtualization with Xen(tm): Including Xenenterprise, Xenserver, and Xenexpress
Virtualization with Xen(tm): Including Xenenterprise, Xenserver, and Xenexpress
Complete Coverage of Xen, Including Version 3.2

Virtualization with Xen is the first book to demonstrate to readers how to install, administer, and maintain a virtual infrastructure based on XenSources latest release, Xen 3.2. It discusses best practices for setting up a Xen environment correctly the first time,
...
Learning Theory: 17th Annual Conference on Learning Theory, COLT 2004, Banff, Canada, July 1-4, 2004, Proceedings
Learning Theory: 17th Annual Conference on Learning Theory, COLT 2004, Banff, Canada, July 1-4, 2004, Proceedings
This book constitutes the refereed proceedings of the 17th Annual Conference on Learning Theory, COLT 2004, held in Banff, Canada in July 2004.

The 46 revised full papers presented were carefully reviewed and selected from a total of 113 submissions. The papers are organized in topical sections on economics and game theory, online learning,...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy