 |
|
 Mastering UnixAll Your Unix Questions—Answered!
Mastering Unix is your source for everything you need to know about today’s most influential operating system. Inside, two Unix experts provide essential information on a wide range of Unix flavors, concentrating on Linux, FreeBSD, and Solaris8. Whether you’re... |  |  Distributed WorkTechnological advances and changes in the global economy are motivating and enabling an increasing geographic distribution of work. Today, the geographic distance between an average pair of workers is increasing in industries ranging from banking, to wine production, to clothing design. According to Bureau of Labor surveys of workers, more people... |  |  DHCP Handbook, The (2nd Edition)The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a... |
|
 A Practical Guide to Ubuntu LinuxUbuntu Linux is a state-of-the-art operating system, and you need a book that’s just as advanced. Along with being the most comprehensive reference to installing, configuring, and working with Ubuntu, A Practical Guide to Ubuntu Linux® also provides extensive server coverage you won’t find in any... |  |  |  |  Apple Training Series: Mac OS X Support Essentials (2nd Edition)The only Apple-certified book on supporting Mac OS X 10.5 Leopard, this comprehensive reference takes support technicians and Mac aficionados deep inside the new operating system, covering everything from installation to networking technologies, and more. Following the learning objectives of the Apple Certified Support Professional exam, the... |
|
 Reverse Engineering Code with IDA Pro
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and... |  |  The Lean Extended Enterprise: Moving Beyond the Four Walls to Value Stream ExcellenceKEY FEATURES
- Demonstrates how to integrate Lean, Six Sigma, Kaizen, and enabling technologies such as SCM, APS, PLM, CRM, ERP, networks, exchanges and portals into a total business improvement initiative to achieve huge breakthroughs in performance
- Illustrates how to develop, organize, launch, and lead a...
|  |  |
|
 A+ Complete Study GuideHere’s the book you need to prepare for the latest versions of CompTIA’s A+ Exams. This Deluxe Edition of Sybex’s Best Selling A+ Study Guide provides:
- Full coverage of every exam objective
- Practical information on network hardware
- Hundreds of
... |  |  Solaris Application Programming (Solaris Series)This book is a guide to getting the best performance out of computers running the Solaris operating system. The target audience is developers and software architects who are interested in using the tools that are available, as well as those who are interested in squeezing the last drop of performance out of the system.
The book caters to... |  |  Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)A common misconception in the Mac community is that the Mac is more secure than any other operating system on the market. Although this might be true in most side-by-side analyses of security features right out of the box, what this isn’t taking into account is that security tends to get overlooked once the machine starts to be configured for... |
|
| Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 |