Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Electronic Communications Code and Property Law: Practice and Procedure
The Electronic Communications Code and Property Law: Practice and Procedure

Life now without access to electronic telecommunications would be regarded as highly unsatisfactory by most of the UK population. Such ready access would not have been achieved without methodical and ultimately enforceable means of access to the land on which to install the infrastructure necessary to support the development of an...

Campus Network Design Fundamentals (Cisco Press Fundamentals)
Campus Network Design Fundamentals (Cisco Press Fundamentals)

The all-in-one guide to the what, why, and how of modern campus network design

  • Provides a "readers digest" overview of modern technologies used to build resilient, scalable campus infrastructures

  • Shows readers how to build...

Implementing CIFS: The Common Internet File System
Implementing CIFS: The Common Internet File System

"The book that Microsoft should have written, but didn't."
—Jeremy Allison, Samba Team

"Your detailed explanations are clear and backed-up with source code—and the numerous bits of humor make a dry subject very enjoyable to read."
—J.D. Lindemann, network engineer, Adaptec, Inc.

The...

Managing NFS and NIS, 2nd Edition
Managing NFS and NIS, 2nd Edition
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.
Managing NFS and NIS, in a new edition based on Solaris 8,
...
Web Performance Tuning: Speeding Up the Web (O'Reilly Nutshell)
Web Performance Tuning: Speeding Up the Web (O'Reilly Nutshell)

When I told people I was writing a book called Web Performance Tuning, the usual response I got was that the title should be "Web Server Performance Tuning." Most people believe that the server is the only part of the Web that you can tune. When you're desperate to improve performance, however, you become much more...

Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
php architect's Guide to PHP Security|
php architect's Guide to PHP Security|
With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to write secure and reliable applications is becoming more and more important every day.

Written by Ilia Alshanetsky, on eo fhte foremost experts on PHP security in the world, php|architect's Guide to PHP Security focuses on...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Winternals: Defragmentation, Recovery, and Administration Field Guide
Winternals: Defragmentation, Recovery, and Administration Field Guide

Winternals first came to my rescue in November of 1999. It was then that I purchased my Winternals Administrator's Pak. It contained BlueSave Version 1.01, ERD Commander Professional Version 1.06, Monitoring Tools (Filemon and Regmon) Enterprise Editions Version 1.0, NTFSDOS Professional Version 3.03, NTRecover Version 1.0, and Remote Recover...

Understanding Linux Network Internals
Understanding Linux Network Internals

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.

Like the popular O'Reilly...

Hybrid Architectures for Intelligent Systems
Hybrid Architectures for Intelligent Systems

The interaction between Fuzzy Set theory and Neural Network theory is multi-faceted and occurs at many different levels. The connection between these two concepts occurs both in the framework of real and artificial neural systems.

The brain is not just a collection of neurons grouped together at some part of the animal’s body,...

UMTS and Mobile Computing
UMTS and Mobile Computing
This unique book bridges the gap between ubiquitous computing (UBICOMP) and third generation mobile communication. A first-of-its-kind, this resource helps you decide which are the most promising technologies to use for specific mobile communication applications. Scenarios indicate how new applications will be developed and how to implement them....
unlimited object storage image
Result Page: 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy