|
|
|
|
|
|
Linux Essentials
Learn Linux, and take your career to the next level!
Linux Essentials, 2nd Edition provides a solid foundation of knowledge for anyone considering a career in information technology, for anyone new to the Linux operating system, and for anyone who is preparing to sit for the Linux Essentials Exam. Through... | | Agents of Influence: Britain’s Secret Intelligence War Against the IRA
Recruited by British Intelligence to infiltrate the IRA and Sinn Féin during the height of the Northern Ireland Troubles, they were ‘agents of influence’. With codenames like INFLICTION, STAKEKNIFE, 3007 and CAROL, these spies played a pivotal role in the fight against Irish republicanism. Now, for the first time, ... | | Software Measurement and Estimation: A Practical ApproachAn effective, quantitative approach for estimating and managing software projects How many people do I need? When will the quality be good enough for commercial sale? Can this really be done in two weeks? Rather than relying on instinct, the authors of Software Measurement and Estimation offer a new, tested approach that includes the... |
|
Designing Security Architecture SolutionsThe first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security... | | Pro Puppet
The lives of system administrators and operations staff often revolve around a series of repetitive tasks: configuring hosts, creating users, and managing applications, daemons, and services. Often these tasks are repeated many times in the life cycle of one host, from building to decommissioning, and as new configuration is added or... | | |
|
|
Result Page: 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 |