TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...
Linux All-in-One Desk Reference For Dummies (Computer/Tech) 8 books in 1— your key to success with Linux!
Your one-stop guide to working with various Linux distributions
Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...
How to Do Everything with Microsoft Office Access 2003 The Microsoft Office Access 2003 database management system can be a powerful tool for you
whether you need to handle business or personal information. The concept of distributing data among
related tables is not new, but the way the concept is implemented in Access 2003 makes information
management a snap. Access 2003 is extremely...
Mac OS X Hacks Mac OS X Hacks reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH,... Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
|Result Page: 81 80 79 78 77 76 75 74 73 72 |