Home | Amazing | Today | Tags | Publishers | Years | Search 
The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
Microsoft Sql Server 7.0 Database Implementation Training Kit
Microsoft Sql Server 7.0 Database Implementation Training Kit
This training teaches IS professionals and SQL developers how to implement database solutions using the latest version of the Microsoft SQL Server relational database management system. Students will gain an understanding of the product's architecture and, through the accompanying labs, attain hands-on experience with the procedures to plan,...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Mac OS X Leopard Bible
Mac OS X Leopard Bible
Get up to speed on Mac OS X Leopard with this in-depth guide

The beauty of Leopard is that there is so much more than meets the eye, including over 300 new enhancements and its ability to run on both Intel PCs and PowerPC Macs. This comprehensive reference is your best guide on how to tame this powerful new cat. You'll find...

Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Google AdSense For Dummies (Computer/Tech)
Google AdSense For Dummies (Computer/Tech)
You can get paid for online ad placement with Google AdSense! If you’ve ever considered using AdSense to improve revenue for your Web site, Google AdSense For Dummies will get you started. It’s loaded with tips to help you implement a successful AdSense program.

AdSense lets you generate income with ad...

The Verilog PLI Handbook: A User's Guide  and Comprehensive Reference on the Verilog Programming Language Interface
The Verilog PLI Handbook: A User's Guide and Comprehensive Reference on the Verilog Programming Language Interface
The Verilog Programming Language Interface is a powerful feature of the Verilog standard. Through this interface, a Verilog simulator can be customized to perform virtually any engineering task desired, such as adding custom design debug utilities, adding proprietary file read/write utilities, and interfacing bus functional C language models to a...
Essential PowerShell (Addison-Wesley Microsoft Technology Series)
Essential PowerShell (Addison-Wesley Microsoft Technology Series)
Use PowerShell to Streamline and Automate Your Most Time-Consuming Windows Administration Tasks

 

With Windows PowerShell, Microsoft brings innovative console-based system administration and scripting to Windows clients and servers....

Google Blogger For Dummies (Computer/Tech)
Google Blogger For Dummies (Computer/Tech)
Are you bemused by blogs? Eager to become a blogger? Google Blogger For Dummies can help you start blogging sooner than you think.

More than 14 million people are promoting a business, connecting with family and friends, and sharing opinions with Google Blogger. This book helps you start a Blogger account, create content, build an...

Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
"The discussion of surveillance techniques is excellent, the legal analysis is sound, and the case for Fourth Amendment reform compelling. Recommended."-Choice (D. E. Smith Choice )

Without our consent and often without our knowledge, the government can constantly...
Joomla! Web Security
Joomla! Web Security
In Detail

Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So,...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy