Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Microsoft SQL Server 2008 Administration with Windows PowerShell (Wrox Programmer to Programmer)
Microsoft SQL Server 2008 Administration with Windows PowerShell (Wrox Programmer to Programmer)

Secure, reliable, and scalable, SQL Server 2008 delivers a dynamic, smart, and productive data platform for all your data-related needs and offers many new features that will change how you administer a database server. Among these new features is the ability to use Windows PowerShell 2.0 scripts to automate and manage various aspects of the...

CCNP TSHOOT 642-832 Official Certification Guide
CCNP TSHOOT 642-832 Official Certification Guide

CCNP TSHOOT 642-832 Official Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the CCNP® TSHOOT exam. Senior instructor and best-selling author Kevin Wallace shares preparation hints and test-taking tips, helping you identify areas of weakness and...

Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Beginning Perl
Beginning Perl
That was the subtitle for this book that was sadly, but wisely, rejected. However, it conveys two things about this book that I’ve tried to focus on: getting a job and having fun while learning the skills you need. Well, as much fun as you can reasonably have while learning how to program. Although many books aren’t...
Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding
Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding

Why should you, a competent software developer or programmer, care about your own brand? After all, it’s not like you're an actor or musician.

In fact, as Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding demonstrates in...

CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNP Data Center Application Centric...
CCNP Practical Studies: Remote Access (CCNP Self-Study)
CCNP Practical Studies: Remote Access (CCNP Self-Study)

Gain hands-on experience of CCNP Remote Access topics with lab scenarios for the new 642-821 BCRAN exam.

  • Prepare for the CCNP 642-821 BCRAN exam and gain a better, practical understanding of exam concepts

  • Experience how remote access...

Security + Exam Guide (Testtaker's Guide Series)
Security + Exam Guide (Testtaker's Guide Series)

The Security+ Exam Guide provides exam candidates with the concepts, objectives, and test-taking skills needed to pass on their first attempt. Instead of covering every computer security topic, this book isolates those topics most likely to be addressed on the exam. Written by an experienced network administrator and CompTIA...

Advances in Mobile Radio Access Networks
Advances in Mobile Radio Access Networks
This book gives a comprehensive overview of the technologies for the advances of
mobile radio access networks. The topics covered include linear transmitters,
superconducting filters and cryogenic radio frequency (RF) front head, radio over
fiber, software radio base stations, mobile terminal positioning, high speed
downlink
...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

unlimited object storage image
Result Page: 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy