Home | Amazing | Today | Tags | Publishers | Years | Search 
J2EE AntiPatterns
J2EE AntiPatterns
"The insights in this book are based on proven solutions from experts. They will ensure the success of your J2EE implementations."
—Bill Brown, AntiPattern Evangelist

All too often delivered software is full of bugs and poorly performing processes. Unfortunately, uncovering exactly what has gone wrong and what needs to...

Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

You've just gotta love Ubuntu; it's an irresistible package of usability, security, and support features. But a power user like you is just itching to teach it some new tricks. Show it how to play nicely with other systems. Develop its multitasking and communication skills. Free its inner video and graphics talents. And make sure that when it...

Distributed Systems Architecture: A Middleware Approach
Distributed Systems Architecture: A Middleware Approach
Middleware is the bridge that connects distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, and programming languages. This book describes middleware from two different perspectives: from the viewpoint of the systems programmer and from the viewpoint of the...
Networking: A Beginner's Guide (Network Professional's Library)
Networking: A Beginner's Guide (Network Professional's Library)

Essential Skills--Made Easy!

Get a solid introduction to networking with this hands-on guide. You'll get all the core information you need to get started--including design and configuration, hardware, networking protocols, remote access, and security--plus, you'll find blueprints that map out network topologies and the OSI networking...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Exploring IBM eServer zSeries and S/390 Servers: See Why IBM's Redesigned Mainframe Computer Family Has Become More Popular than Ever!
Exploring IBM eServer zSeries and S/390 Servers: See Why IBM's Redesigned Mainframe Computer Family Has Become More Popular than Ever!
Considered the bible of the IBM zSeries and S/390 world, this new edition closely examines the role large computers will play in the new century. All the new hardware models and operating system products—Linux, VSE, MVS, VM, AIX, and Open Edition—are now available for the zSeries and are fully explained, as are critical business issues...
How to Cheat at Microsoft Vista Administration
How to Cheat at Microsoft Vista Administration
The Perfect Reference for the Multitasked SysAdmin
The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the systems reliability,
...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Mastering Windows Vista Business: Ultimate, Business, and Enterprise
Mastering Windows Vista Business: Ultimate, Business, and Enterprise
In-depth Coverage of Windows Vista Ultimate, Business, and Enterprise

Learn to install, configure, run, and troubleshoot the professional versions of Vista in this comprehensive new guide from two leading Windows authorities. From Vista's all-new interface, 32-bit/64-bit architecture, and advanced security features to its fantastic new...

Ruby by Example: Concepts and Code
Ruby by Example: Concepts and Code
There may be no better way to learn how to program than by dissecting real, representative examples written in your language of choice. Ruby by Example analyzes a series of Ruby scripts, examining how the code works, explaining the concepts it illustrates, and showing how to modify it to suit your needs. Baird's examples demonstrate key...
Why Programs Fail: A Guide to Systematic Debugging
Why Programs Fail: A Guide to Systematic Debugging
Why Programs Fail is about bugs in computer programs, how to find them, how to reproduce them, and how to fix them in such a way that they do not occur anymore. This is the first comprehensive book on systematic debugging and covers a wide range of tools and techniques ranging from hands-on observation to fully automated diagnoses,...
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy