Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Nginx HTTP Server - Second Edition
Nginx HTTP Server - Second Edition

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache,...

PalmPilot: The Ultimate Guide: Mastering Palm Organizers from Pilot 1000 to Palm VII
PalmPilot: The Ultimate Guide: Mastering Palm Organizers from Pilot 1000 to Palm VII

3Com's PalmPilot is the world's bestselling hand-held computer platform. In three years, its 16 models from 5 different manufacturers have captured 80 percent of the palmtop market. About the size of a playing card, Palm devices are lightweight (under 6 ounces), offering two-month battery life, handwriting recognition,...

Beginning Application Development with TensorFlow and Keras: Learn to design, develop, train, and deploy TensorFlow and Keras models as real-world applications
Beginning Application Development with TensorFlow and Keras: Learn to design, develop, train, and deploy TensorFlow and Keras models as real-world applications

You need much more than imagination to predict earthquakes and detect brain cancer cells. Become an expert in designing and deploying TensorFlow and Keras models, and generate insightful predictions with the power of deep learning.

Key Features

  • Cover the basics of neural networks and...
Microsoft Windows 2000 Server Administrator's Companion, Second Edition
Microsoft Windows 2000 Server Administrator's Companion, Second Edition

When the first edition of this book was published in 2000 coinciding with the release of the Microsoft Windows 2000 family of operating systems, we were extremely gratified by the positive reception from network administrators and others interested in Windows 2000 Server. We're very proud of the book and think it's a worthwhile resource for...

Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
Practical Industrial Data Networks: Design, Installation and Troubleshooting (IDC Technology)
Practical Industrial Data Networks: Design, Installation and Troubleshooting (IDC Technology)
This is a comprehensive book covering the essentials of troubleshooting and problem solving of
industrial data communications systems including areas such as RS-232, RS-485, industrial protocols
such as Modbus, fiber optics, industrial Ethernet, TCP/IP, DeviceNet and Fieldbus protocols such as
Profibus and Foundation Fieldbus. It can
...
Building a Cisco Network for WIndows 2000
Building a Cisco Network for WIndows 2000
The release of Windows 2000 Server represents a major advance in the integration of Microsoft's and Cisco's network technologies. Windows 2000 provides an LDAP-compliant directory service called Active Directory. It is accessible over any TCP/IP based internetwork, including the Internet. As such, the Active Directory is the foundation of this...
Mastering Windows Vista Business: Ultimate, Business, and Enterprise
Mastering Windows Vista Business: Ultimate, Business, and Enterprise
In-depth Coverage of Windows Vista Ultimate, Business, and Enterprise

Learn to install, configure, run, and troubleshoot the professional versions of Vista in this comprehensive new guide from two leading Windows authorities. From Vista's all-new interface, 32-bit/64-bit architecture, and advanced security features to its fantastic new...

European Robotics Symposium 2006 (Springer Tracts in Advanced Robotics)
European Robotics Symposium 2006 (Springer Tracts in Advanced Robotics)
This unique reference represents a cross-section of forefront robotics research, ranging from robotics and systems to learning, autonomy and failure detection, from vision and navigation to localization and mapping, which are based on the papers presented at the 1st European Robotics Symposium (EUROS-06) held in Palermo, Italy from 16-18 March,...
Home Theater For Dummies (Computer/Tech)
Home Theater For Dummies (Computer/Tech)

A low-tech way to understand a high-tech system!

Create the home entertainment center that fits your home and your tastes

Gadget fans, a home theater setup is the stuff your dreams are made of. This book keeps the dream from becoming a nightmare! Here's how to select, set up, and optimize a system, translate the salesperson's...

unlimited object storage image
Result Page: 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 313 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy