Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
grep Pocket Reference
grep Pocket Reference
grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket...
RMAN Recipes for Oracle Database 12c: A Problem-Solution Approach (Expert's Voice in Oracle)
RMAN Recipes for Oracle Database 12c: A Problem-Solution Approach (Expert's Voice in Oracle)

RMAN Recipes for Oracle Database 12c is an example-driven approach to the Oracle database administrator's #1 job responsibility: 

  • Be able to recover the database.

Of all the things you are responsible for as database administrator, nothing is more important than the data itself. Like it...

Apache Server 2 Bible
Apache Server 2 Bible
"Kabir has done it again! The Apache Server 2 Bible is an invaluable reference for both beginning and experienced administrators." —Elizabeth Zinkann, Sys Admin Magazine Contributing Editor and Review Columnist
  • Configure Apache Server for a Linux/Unix or Win32 system
  • Leverage Apache using SSI, CGI, PHP,...
HackNotes(tm) Web Security Pocket Reference
HackNotes(tm) Web Security Pocket Reference

HackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today's Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted...

Python Web Development with Django
Python Web Development with Django

Using the simple, robust, Python-based Django framework, you can build powerful Web solutions with remarkably few lines of code. In Python Web Development with Django®, three experienced Django and Python developers cover all the techniques, tools, and concepts you need to make the most of Django 1.0, including all the major...

Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

WordPress For Dummies  (Computer/Tech)
WordPress For Dummies (Computer/Tech)
Bloggers love WordPress! If you're ready to start using this free blogging software, WordPress For Dummies, 2nd Edition is just what you and your blog need to make a splash.

Professional blog designer Lisa Sabin-Wilson shows you how to use all the latest upgrades to WordPress and helps you decide whether to use the Wordpress.com hosted...

Financial Econometrics, Mathematics and Statistics: Theory, Method and Application
Financial Econometrics, Mathematics and Statistics: Theory, Method and Application

This rigorous textbook introduces graduate students to the principles of econometrics and statistics with a focus on methods and applications in financial research. Financial Econometrics, Mathematics, and Statistics introduces tools and methods important for both finance and accounting that assist with asset...

MySQL for Python
MySQL for Python

Python is a dynamic programming language, which is completely enterprise ready, owing largely to the variety of support modules that are available to extend its capabilities. In order to build productive and feature-rich Python applications, we need to use MySQL for Python, a module that provides database support to our applications. Although...

Creating Web Pages For Dummies
Creating Web Pages For Dummies
Share photos and video online with friends and family

Take advantage of free tools, find out about Web design, and get interactive

Okay, you've taken that deep breath and are ready to jump into Web page creation. Before you get hopelessly tangled in all the possibilities, dive into this book! You'll start with free and easy tools,...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Snort Cookbook
Snort Cookbook
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy