|
|
|
|
Anywhere Computing with Laptops: Making Mobile Easier (One-Off)You bought your Centrino laptop computer because of its ease-of-use and portability. But are you using your laptop to its maximum potential? Anywhere Computing with Laptops: Making Mobile Easier will show you what to expect when buying and configuring your laptop and how to use built-in features such as digital... | | Active Defense: A Comprehensive Guide to Network SecurityToday's networks incorporate more security features than ever before, yet hacking grows more common and more severe. Technology alone is not the answer. You need the knowledge to select and deploy the technology effectively, and the guidance of experts to develop a comprehensive plan that keeps your organization two steps ahead... | | SCWCD Exam Study Kit Second Edition: Java Web Component Developer CertificationThis book is for Java programmers who want to prepare for the SCWCD exam, which focuses on the Servlet and JavaServer Pages technologies. This book will also be very useful for beginners since we have explained the concepts using simple examples. The text will bring you up to speed even if you are totally new to these technologies. Even expert... |
|
Wi-Fi Home Networking
For many professionals, wireless home computer networking delivers the power of corporate technology — without the hassles of corporate living, and the mobile connectivity to all of the computers throughout your home (or backyard) — without rewiring.
That’s why if you plan to set up a wireless... | | Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)The perfect study companion for UNIX system professionals preparing for both Solaris 8 System Administrator exams. The book contains accurate and efficient coverage of the many new features of the Solaris 8 system including new support for Ipv6, LDAP, and DHCP, installs using Solaris Web Start, new Universal Disk Format (UDF) file system support,... | | Absolute Beginner's Guide to Networking, Fourth Edition Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the... |
|
Inside Internet Security: What Hackers Don't Want You To KnowThis book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business.... | | Learning Red Hat LINUX: Guide to Red Hat LINUX for New UsersLearning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)... | | Protected: Internet, Intranet, & Virtual Private NetworksA systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web... |
|
Microsoft Office Outlook 2007 Inside OutLearn everything you need to know for working with Microsoft Office Outlook 2007from the inside out! This book packs hundreds of time-saving solutions, troubleshooting tips, and workarounds for using Office Outlook 2007all in concise, fast-answer format. Whether you are upgrading from Office 97 or Office 2003, youll be able to dig in to the... | | Programming Erlang: Software for a Concurrent WorldErlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.
Moore's Law is the observation that the amount you can do on a single chip... | | Network Security Assessment: Know Your NetworkHow secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this... |
|
|
Result Page: 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 |