Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Crystal Reports 10 : The Complete Reference (Complete Reference Series)
Crystal Reports 10 : The Complete Reference (Complete Reference Series)

Create visually appealing reports and publish them on the Web with Crystal Reports 10 and help from this comprehensive resource. Whether you’re a beginner or a power user looking for answers to quick questions, many examples and tips, along with clear discussion of the new and improved features, make this a must-have workplace...

Making Android Accessories with IOIO
Making Android Accessories with IOIO
Android phones are a great platform for developing apps, but sometimes it is nice if those apps go beyond the built-in hardware of the phone and connect to some homemade electronics.

The IOIO board allows you to do just that, and this book will show you how to use the IOIO board and interface it to various different
...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Windows PowerShell Cookbook: for Windows, Exchange 2007, and MOM V3
Windows PowerShell Cookbook: for Windows, Exchange 2007, and MOM V3

This Cookbook by Windows PowerShell team developer Lee Holmes provides hundreds of tested scripts that you can use right away to get Microsoft's new tool working for you. More than 150 recipes, combined with a concise task-based introduction to the Windows PowerShell scripting language and environment, make it the perfect look-up guide...

The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF....

Tcl 8.5 Network Programming
Tcl 8.5 Network Programming

Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving...

Creating Web Pages All in One
Creating Web Pages All in One

Did you know that all the tools you need to create GREAT Web pages are free -  they are built right into Windows XP or are free online!

In Sams Teach Yourself to Create Web Pages All in One you will learn the basics on creating a variety of different types of...

Security Log Management: Identifying Patterns in the Chaos
Security Log Management: Identifying Patterns in the Chaos
Logs, logs, logs. Ever since I started taking my first steps in the world of security,
it has been clear that “the log” plays a crucial—and sometimes undervalued—
role in the security management of any IT infrastructure.This fact
alone explains the plethora of tools, applications, and solutions whose only
...
Learning Perl on Win32 Systems
Learning Perl on Win32 Systems
In this smooth, carefully paced course, leading Perl trainers and a Windows NT practitioner teach you to program in the language that promises to emerge as the scripting language of choice on NT. Perl for Win32 is a language for easily manipulating text, files, user and group profiles, performance and event logs, and registry entries. Based on...
Developing Windows Error Messages: Error Messages that Communicate
Developing Windows Error Messages: Error Messages that Communicate

Although the computer industry has made enormous advances in the last 25 years, the development of error messages has somehow been left behind. Error messages themselves have only progressed from reporting errors as numerical codes to popping up rather simple text messages. The vast majority of the error messages that are currently...

Migrating to Netware 4.1
Migrating to Netware 4.1

In the logical view of the network, resources are organized into groups that are in turn organized into a hierarchy that reflects their usage, function, or geographical location. For the user to use the resources on this network, the user logs in to this logical view of the network. Access to resources on the network can be controlled by...

Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy