Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The XP Files:  Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration
The XP Files: Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration

XP's Best-Kept Secrets--Revealed!

During the past decade, Microsoft has created the some of the best Internet communication programs in the world and has installed them on every Windows computer--free, but mostly hidden. Until now, only a few knowledgeable computer users knew how to exploit the potential of these programs--and understood...

Beginning SQL Server 2012 Administration (Beginning Apress)
Beginning SQL Server 2012 Administration (Beginning Apress)
The SQL Server product has been around since the late 1980s. Back then, Microsoft worked together with Sybase to create a database on the OS/2 platform. Shortly after this effort was completed, Microsoft realized it wanted to tightly couple SQL Server with Windows. By 1993, Microsoft had released Windows NT 3.1, and with it came the option of...
Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
SQL Server 2005 Management and Administration
SQL Server 2005 Management and Administration

Microsoft SQL Server 2005 Management and Administration, based on Service Pack 2, addresses the challenges database administrators regularly encounter on SQL Server 2005 by providing detailed guidance in the areas of management, administration, security, and monitoring. With coverage of the new features and...

The Gordion Wooden Objects, Volume 1 The Furniture from Tumulus MM (2 vols) (Culture and History of the Ancient Near East)
The Gordion Wooden Objects, Volume 1 The Furniture from Tumulus MM (2 vols) (Culture and History of the Ancient Near East)

"The Furniture from Tumulus MM" is a study of the furniture from the largest tomb at Gordion, Turkey, excavated in 1957 by the University of Pennsylvania Museum. The tomb dates to the eighth century BC and is thought to be the burial of the great Phrygian king Midas or his father. The objects, initially misunderstood, are now...

Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services

Writing robust enterprise applications presents a special challenge for developers, but Microsoft has addressed that challenge with the free, downloadable Enterprise Library for the .NET Framework.

Enterprise Library is a collection of application blocks and guidance documents that together provide functionality common to enterprise...

101 Microsoft Visual Basic .NET Applications
101 Microsoft Visual Basic .NET Applications

Explore 101 of the most useful Visual Basic .NET applications in action—and jumpstart your own Microsoft .NET Framework-based development projects. This guide provides expert, behind-the-code commentary on 101 fully executable code samples—distilling more than 700 hours of programming time into best practices for Microsoft...

Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis: Breaking Ciphers in the Real World
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material...
Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
Check Point NGX R65 Security Administration
Check Point NGX R65 Security Administration
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity...
Getting Started with OAuth 2.0
Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy