|
|
|
|
The Electronic Communications Code and Property Law: Practice and Procedure
Life now without access to electronic telecommunications would be regarded as highly unsatisfactory by most of the UK population. Such ready access would not have been achieved without methodical and ultimately enforceable means of access to the land on which to install the infrastructure necessary to support the development of an... | | | | Implementing CIFS: The Common Internet File System"The book that Microsoft should have written, but didn't." —Jeremy Allison, Samba Team
"Your detailed explanations are clear and backed-up with source code—and the numerous bits of humor make a dry subject very enjoyable to read." —J.D. Lindemann, network engineer, Adaptec, Inc.
The... |
|
Managing NFS and NIS, 2nd EditionA modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem. Managing NFS and NIS, in a new edition based on Solaris 8,... | | Web Performance Tuning: Speeding Up the Web (O'Reilly Nutshell)
When I told people I was writing a book called Web Performance Tuning, the usual response I got was that the title should be "Web Server Performance Tuning." Most people believe that the server is the only part of the Web that you can tune. When you're desperate to improve performance, however, you become much more... | | Implementing SSH: Strategies for Optimizing the Secure Shell Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to... |
|
php architect's Guide to PHP Security|With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to write secure and reliable applications is becoming more and more important every day.
Written by Ilia Alshanetsky, on eo fhte foremost experts on PHP security in the world, php|architect's Guide to PHP Security focuses on... | | | | Winternals: Defragmentation, Recovery, and Administration Field GuideWinternals first came to my rescue in November of 1999. It was then that I purchased my Winternals Administrator's Pak. It contained BlueSave Version 1.01, ERD Commander Professional Version 1.06, Monitoring Tools (Filemon and Regmon) Enterprise Editions Version 1.0, NTFSDOS Professional Version 3.03, NTRecover Version 1.0, and Remote Recover... |
|
Understanding Linux Network InternalsIf you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.
Like the popular O'Reilly... | | Hybrid Architectures for Intelligent SystemsThe interaction between Fuzzy Set theory and Neural Network theory is multi-faceted and occurs at many different levels. The connection between these two concepts occurs both in the framework of real and artificial neural systems.
The brain is not just a collection of neurons grouped together at some part of the animal’s body,... | | UMTS and Mobile ComputingThis unique book bridges the gap between ubiquitous computing (UBICOMP) and third generation mobile communication. A first-of-its-kind, this resource helps you decide which are the most promising technologies to use for specific mobile communication applications. Scenarios indicate how new applications will be developed and how to implement them.... |
|
|
Result Page: 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 |