Home | Amazing | Today | Tags | Publishers | Years | Search 
Absolute OpenBSD: UNIX for the Practical Paranoid
Absolute OpenBSD: UNIX for the Practical Paranoid

This book takes readers through the intricacies of the OpenBSD platform, and teaches them how to manage the system with friendly explanations, background information, troubleshooting suggestions, and copious examples.

This straightforward, practical, and complete guide to mastering the powerful and complex OpenBSD operating system,...

Troubleshooting Linux(R) Firewalls
Troubleshooting Linux(R) Firewalls

When something goes wrong with your Linux firewall, you need to fix itright now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes:...

Berkeley DB
Berkeley DB

Small, special-purpose computing devices and high-end core Internet servers need fast, reliable database management. Berkeley DB is an embedded database that provides high-performance, scalable, transaction-protected and recoverable data management services to applications. Extremely portable, this library runs under almost all...

Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
The increasing complexity and diversity of systems, applications, and networks has made them more difficult to defend. As companies continue to experience losses due to security breaches, security professionals must take a new approach in protecting their assets. By using monitoring and detection measures with prompt intervention, you can...
MCSE Training Kit—Microsoft Windows 2000 Active Directory Services
MCSE Training Kit—Microsoft Windows 2000 Active Directory Services

Welcome to the MCSE Training Kit—Microsoft Windows 2000 Active Directory Services. This kit prepares you to install, configure, administer, monitor, and troubleshoot Microsoft Windows 2000 Active Directory.

This kit introduces you to Windows 2000 Active Directory and prepares you to plan, configure, and administer your...

Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Wireless Java : Developing with Java 2, Micro Edition
Wireless Java : Developing with Java 2, Micro Edition
  • Master J2ME and its Mobile Information Device Profile (MIDP)
  • Learn how to program MIDlets, Java's answer to building wireless distributed applications
  • Gain the skills needed to use one of the most popular programming languages in next-generation applications

Despite Java’s...

Microsoft Visual J# .NET (Core Reference)
Microsoft Visual J# .NET (Core Reference)

Java-language developers—learn how to create .NET applications with the Microsoft development tool for you: Visual J# .NET.

Leverage your Java skills and learn how to create powerful Microsoft Windows® applications and high-performance, distributed applications with Visual J# .NET in this...

Cisco ASA and PIX Firewall Handbook, First Edition
Cisco ASA and PIX Firewall Handbook, First Edition
A concise reference to implementing the most popular PIX Firewall 7.0 and 6.3 features Learn how to configure the new PIX Firewall version 7.0 Understand, install, and support the most common features of the best-selling Cisco Systems® PIX and IOS firewall products Learn from configuration examples that graphically illustrate complex...
Data Binding with Windows Forms 2.0 : Programming Smart Client Data Applications with .NET
Data Binding with Windows Forms 2.0 : Programming Smart Client Data Applications with .NET

"Data Binding with Windows Forms 2.0 earns a gold star and a prized place in my development book library. Brian is an exceptional teacher of technology, best practices, and technique. He continues to educate at every presentation I attend; his book...

Web Services Security
Web Services Security

Minimize security risks in your system by successfully rolling out secure Web Services with help from this exceptional guide. Web Services Security covers everything network security professionals need to know, including details on Web Services architecture, SOAP, UDDI, WSDL, XML Signature, XML Encryption, SAML, XACML, XKMS, and...

SUSE LINUX Enterprise Server 9 Administrator's Handbook
SUSE LINUX Enterprise Server 9 Administrator's Handbook

As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure...

Result Page: 323 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy