Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Networks: A Systems Approach, 3rd Edition (The Morgan Kaufmann Series in Networking)
Computer Networks: A Systems Approach, 3rd Edition (The Morgan Kaufmann Series in Networking)
In this new edition of their classic and bestselling textbook, authors Larry Peterson and Bruce Davie continue to emphasize why networks work the way they do. Their "system approach" treats the network as a system composed of interrelated building blocks (as opposed to strict layers), giving students and professionals the best possible...
Distributed Services with OpenAFS: for Enterprise and Education
Distributed Services with OpenAFS: for Enterprise and Education
This book shows in detail how to build enterprise-level secure,redundant, and highly scalable services from scratch on top of theopen source Linux operating system, suitable for small companies aswell as big universities. The core architecture presented is based onKerberos, LDAP, AFS, and Samba. It is shown how to integrate web,message related,...
Inside SQLite
Inside SQLite

SQLite is a small, zero-configuration, custom-tailored, embeddable, threadsafe, easily maintainable, transactionoriented, SQL-based, relational database management system. There is no separate install or setup procedure to initialize SQLite before using it. There is no configuration file.

SQLite is open source, and...

Grid Computing Security
Grid Computing Security
Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and...
Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Linux has come a long way in a short time. Computing itself is still relatively young by any standard; if the era of modern computing started with the invention of the microchip, it’s still less than 50 years old. But Linux is a youngster compared even to this; it has been around for only 16 of those years.

In that brief time span,
...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

First Steps: Developing BizTalk Applications
First Steps: Developing BizTalk Applications
When I first decided to learn about BizTalk, I went to Microsoft’s site and downloaded the 120-day evaluation copy along with all of the available documentation and tutorials. I worked my way through one of the tutorials, and I then purchased a book about BizTalk. Even though the book and the Microsoft documentation were helpful, I still did...
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
Advances in Computer, Information, and Systems Sciences, and Engineering: Proceedings of IETA 2005, TeNe 2005 and EIAE 2005
Advances in Computer, Information, and Systems Sciences, and Engineering: Proceedings of IETA 2005, TeNe 2005 and EIAE 2005
CISSE 2005, the World's first Engineering/Computing and Systems Research E-Conference was the first high-caliber Research Conference in the world to be completely conducted online in real-time via the internet.

CISSE received 255 research paper submissions and the final program included 140 accepted papers, from more than 45 countries. The...

Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Windows XP in a Nutshell
Windows XP in a Nutshell
This compact and comprehensive book systematically unveils what resolute users of the new Windows XP operating system will find interesting and useful, with little-known details, utility programs, and configuration settings all captured in a consistent reference format.

A hands-on guide, Windows XP in a Nutshell cuts through the hype...

IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
The authoritative reference text on KAME and IPv6!

IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6
...
Result Page: 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy