 |
|
 Microsoft Small Business Server 2003 UnleashedIf you are new to the world of Microsoft Small Business Server 2003, Microsoft Small Business Server 2003 Unleashed can provide you with real-world support experience as you get started or explore your upgraded server. Written and reviewed by Small Business Server MVPs, this book provides... |  |  Network Security Foundations : Technology Fundamentals for IT SuccessThe world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the... |  |  PHP and MySQL for Dummies, Second EditionUpdated for PHP 5 and MySQL 4
Create dynamic, interactive Web pages on Windows®, Linux®, or Mac OS® X systems
Open up a whole new world of Web database applications with PHP and MySQL, the perfect open source pair! This handy guidebook shows you how, with sample applications of an... |
|
|
 Maximum Wireless SecurityMaximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.
The authors provide information to satisfy the expert's hunger for in-depth information with actual source code,... |  |  Ipv6 Essentials
IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6... |  |  Wi-Fi SecurityCOMPLETE COVERAGE OF THE TECHNOLOGY THAT’S MAKING WIRELESS COMMUNICATIONS VIRTUALLY IMMUNE TO HACKERS!
Wireless technology offers businesses a world of strategic advantages — and a host of security problems. But thanks to McGraw-Hill’s WiFi Security, your company’s mission-critical data can be... |
|
 Sarbanes-Oxley IT Compliance Using COBIT and Open Source ToolsA Toolkit for IT Professionals
Whether you work for a publicly traded or pre-IPO company or as an IT consultant, you are familiar with the daunting task of complying with the Sarbanes-Oxley Act. You have no doubt seen the hour and dollar estimates for compliance go up... |  |  UNIX Power Tools, Second EditionIdeal for UNIX users who hunger for technical -- yet accessible -- information, UNIX Power Tools, 2nd Edition, consists of tips, tricks, concepts, and freeware (CD-ROM included). It also covers add-on utilities and how to take advantage of clever features in the most popular UNIX utilities. Loaded with even more... |  |  Mac OS X for Java GeeksMac OS X for Java Geeks delivers a complete and detailed look at the Mac OS X platform, geared specifically at Java developers. Programmers using the 10.2 (Jaguar) release of Mac OS X, and the new JDK 1.4, have unprecedented new functionality available to them. Whether you are a Java newbie, working your way through... |
|
Result Page: 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 |