Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Embedded Linux Systems
Building Embedded Linux Systems
Building Embedded Linux Systems shows you how to design and build your own embedded systems using Linux® as the kernel and freely available open source tools as the framework. Written by an active member of the open source community, the book is structured to gradually introduce readers to the intricacies of...
Security+ Study Guide, 2nd Edition (SYO-101)
Security+ Study Guide, 2nd Edition (SYO-101)
Here's the book you need to prepare for CompTIA's Security+ exam. This updated edition of the best-selling Security+ Study Guide was developed to meet the exacting requirements of today's certification candidates and aspiring IT security professionals. In addition to the consistent and accessible instructional...
Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Ubuntu on a Dime: The Path to Low-Cost Computing (Path to Low Cost Computing)
Ubuntu on a Dime: The Path to Low-Cost Computing (Path to Low Cost Computing)
You know that Ubuntu software costs nothing. Now you want the PC system that costs as little as possible and runs Ubuntu and OS applications without complaints and calls to tech support.

So you spend your hard–earned dollars on the hardware only and have your own optimized Ubuntu PC. This is the book that will show you how to get what you...

Programming Ruby 1.9 & 2.0: The Pragmatic Programmers' Guide (The Facets of Ruby)
Programming Ruby 1.9 & 2.0: The Pragmatic Programmers' Guide (The Facets of Ruby)

Ruby is the fastest growing and most exciting dynamic language out there. If you need to get working programs delivered fast, you should add Ruby to your toolbox.

This book is the only complete reference for both Ruby 1.9 and Ruby 2.0, the very latest version of Ruby.

2013 marks the 20th
...

Microsoft Small Business Server 2003 Unleashed
Microsoft Small Business Server 2003 Unleashed

If you are new to the world of Microsoft Small Business Server 2003, Microsoft Small Business Server 2003 Unleashed can provide you with real-world support experience as you get started or explore your upgraded server. Written and reviewed by Small Business Server MVPs, this book provides...

Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Building an On Demand Computing Environment with IBM : How to Optimize Your Current Infrastructure for Today and Tomorrow
Building an On Demand Computing Environment with IBM : How to Optimize Your Current Infrastructure for Today and Tomorrow

This author describes the three components of the on demand business model so you can understand how your business can benefit and how you can evolve your current computing infrastructure to achieve the flexibility vital to this era.

In October 2002, IBM launched a new corporate-wide strategy called...

Beginning Perl Web Development: From Novice to Professional
Beginning Perl Web Development: From Novice to Professional

Beginning Perl Web Development: From Novice to Professional introduces you to the world of Perl Internet application development. This book tackles all areas crucial to developing your first web applications and includes a powerful combination of real-world examples coupled with advice. Topics range from serving and consuming RSS feeds,...

Art of RAW Conversion: How to Produce Art-Quality Photos with Adobe Photoshop CS2 and Leading RAW Converters
Art of RAW Conversion: How to Produce Art-Quality Photos with Adobe Photoshop CS2 and Leading RAW Converters
The RAW file format used by digital cameras is essentially the raw data that a camera captures when it takes a photo. RAW files allow the digital photographer to edit and manipulate their photos with less data loss than in other file formats (such as JPEG). There are many RAW conversion tools, and it's often a good idea to use more than one to get...
unlimited object storage image
Result Page: 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy