Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Your Own Home For Dummies
Building Your Own Home For Dummies
Keep construction on track with helpful checklists

Turn your dream of a custom home into reality!

Thinking about building your own home? This easy-to-follow guide shows you how to plan and build a beautiful home on any budget. From acquiring land to finding the best architect to overseeing the construction, you get lots of savvy...

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results
Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results

Once you've got a web site up and running it is all too easy to sit back and relax. But how do you know you did a good job? How can you improve the site you have based on real user behaviour? Without getting feedback from your users, how will you find out how it's being used? Web traffic analysis allows you to gain some insight into...

Active Directory By the Numbers: Windows Server 2003
Active Directory By the Numbers: Windows Server 2003
This text takes you step-by-step through the fascinating world of inter-connected computing. Learn the basics, how to keep client computers up to date, back up servers, protect servers from viruses, and much more.

Windows Server 2003, Microsoft’s newest server operating system, builds upon the legendary scalability and flexibility...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd...

UNIX System Programming for System VR4 (Nutshell Handbooks)
UNIX System Programming for System VR4 (Nutshell Handbooks)

Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing...

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry...
Axioms and Hulls (Lecture Notes in Computer Science)
Axioms and Hulls (Lecture Notes in Computer Science)

A FEW YEARS AGO some students and I were looking at a map that pinpointed the locations of about loo cities. We asked ourselves, "Which of these cities are neighbors of each other?" We knew intuitively that some pairs of cities were neighbors and others were not; we wanted to find a formal mathematical characterization that...

Microsoft Exchange Server 2010 Inside Out
Microsoft Exchange Server 2010 Inside Out

Welcome to my tenth book covering the technology in Microsoft Exchange Server and its surrounding ecosystem. I seem to have been constantly writing about Exchange since before its introduction as version 4.0 in March 1996 in books and many articles printed in the redoubtable Windows IT Pro magazine (http://www.windowsitpro.com). All my...

A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems
A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems

The recent remarkable developments of interior point algorithms began in 1984 with Karmarkar's polynomial-time interior point algorithm for linear programs using a log- arithmic potential function and a projective transformation. The progress has been made so rapidly and extensively that it seems difficult to get a comprehensive...

Practical Enterprise Software Development Techniques: Tools and Techniques for Large Scale Solutions
Practical Enterprise Software Development Techniques: Tools and Techniques for Large Scale Solutions

This expanded and updated edition of "Practical Enterprise Software Development Techniques" includes a new chapter which explains what makes enterprise scale software development different from other development endeavors. Chapter 4 has been expanded with additional coverage of code review, bug tracker systems and agile software...

bash Cookbook: Solutions and Examples for bash Users
bash Cookbook: Solutions and Examples for bash Users

Every modern operating system has at least one shell and some have many. Some shells are command-line oriented, such as the shell discussed in this book. Others are graphical, like Windows Explorer or the Macintosh Finder. Some users will interact with the shell only long enough to launch their favorite application, and then never emerge from...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy