Home | Amazing | Today | Tags | Publishers | Years | Search 
Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Mac OS X Server 10.4 Tiger: Visual QuickPro Guide
Offering Apple's legendary ease of use plus everything you would expect from a Unix-based operating system--preemptive multitasking, symmetric multiprocessing, and support for networking and security standards--Mac OS X Server has revolutionized the world of network administration. Mac OS X Tiger server continues that tradition by offering more...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Administering Windows Vista Security: The Big Surprises
Administering Windows Vista Security: The Big Surprises
An Inside Look at Windows Vista Security for Systems Administrators

Get an early start on Windows Vista security and the technology shifts you'll need to know as a systems administrator. From leading Windows expert Mark Minasi comes this "just-in-time" book to get you there. This targeted, hands-on...

Handbook of Critical Information Systems Research: Theory And Application
Handbook of Critical Information Systems Research: Theory And Application
This important Handbook provides a unique overview of information systems (IS) research by focusing on the increasing interest in critical-related issues. Representing a significant step forward in the development of critical perspectives on the IS field, the Handbook draws together original contributions from leading authors who offer alternatives...
802.1X Port-Based Authentication
802.1X Port-Based Authentication
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of...
Hacking Exposed 5th Edition
Hacking Exposed 5th Edition
“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine

"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine

"For almost any computer book, you can find a...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then...
Advances in Fuzzy Clustering and its Applications
Advances in Fuzzy Clustering and its Applications

A comprehensive, coherent, and in depth presentation of the state of the art in fuzzy clustering.

Fuzzy clustering is now a mature and vibrant area of research with highly innovative advanced applications. Encapsulating this through presenting a careful selection of research contributions, this book...

WiMAX: Taking Wireless to the MAX
WiMAX: Taking Wireless to the MAX
With market value expected to reach $5 billion by 2007 and the endorsement of some of the biggest names in telecommunications, World Interoperability for Microwave Access (WiMAX) is poised to change the broadband wireless landscape. But how much of WiMAX's touted potential is merely hype? Now that several pre-WiMAX networks have been deployed, what...
Applescript Finder Guide: English Dialect
Applescript Finder Guide: English Dialect
Since 1985, Apple and Addison-Wesley have been publishing authoritative books about Apple technologies. The Apple Technical Library provides Macintosh developers with the official treatment of all the major new technologies that Apple releases. Timely, accurate, and clear, this collection of books is the essential resource for...
Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
CCNP BSCI Official Exam Certification Guide (4th Edition)
CCNP BSCI Official Exam Certification Guide (4th Edition)
CCNP BSCI Official Exam Certification Guide, Fourth Edition, is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the BSCI exam. Successfully passing the BSCI 642-901 exam certifies that you have the knowledge and skills necessary to use advanced IP addressing and routing in implementing...
Result Page: 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy