 |
|
 Perl Medic : Transforming Legacy CodeBring new power, performance, and scalability to your existing Perl code!
Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of... |  |  |  |  IP in Wireless NetworksThe complete network professional's guide to delivering wireless IP.
- Wireless IP: the professional's guide to understanding data in wireless networks
- Covers IP in 802.11, Bluetooth(tm), GSM/GPRS, W-CDMA, cdma2000, i-mode, and more
- Includes expert insights into architecture, mobility models, and...
|
|
|
 Active Directory By the Numbers: Windows Server 2003This text takes you step-by-step through the fascinating world of inter-connected computing. Learn the basics, how to keep client computers up to date, back up servers, protect servers from viruses, and much more.
Windows Server 2003, Microsoft’s newest server operating system, builds upon the legendary scalability and flexibility... |  |  Hack Proofing Your Network (Second Edition)This book is intended to teach skills that will be useful for breaking into computers. If that statement shocks you, then you probably aren’t familiar with the legitimate reasons for hacking.These reasons can be security testing, consumer advocacy and civil rights, military interests, and “hacktivist” politics;... |  |  Configuring Check Point NGX VPN-1/Firewall-1Check Point FireWall-1 came out in 1994 and was an immediate success. It has been the market-leading firewall platform for over 10 years. It is no wonder the platform has done so well.The Check Point Graphical User Interface for managing firewall policies is extremely intuitive and easy to learn.
Check Point has come a... |
|
|
| Result Page: 325 324 323 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 |