|
|
|
|
|
|
Citrix XenApp Platinum Edition for Windows: The Official GuideThe Authorized Guide to Citrix XenApp Platinum Edition for Windows
Design, deploy, and maintain a virtualized, on-demand enterprise application delivery infrastructure. Citrix XenApp Platinum Edition for Windows: The Official Guide explains how to ensure high availability, enhance productivity, and reduce costs... | | CouchDB and PHP Web Development Beginner’s Guide
PHP and CouchDB Web Development will teach you the fundamentals of combining CouchDB and PHP to create a full application from conception to deployment. This book will direct you in developing a basic social network, while guiding you through some of the common pitfalls that are frequently associated with NoSQL databases.
CouchDB... | | Up to Speed with SwingStephen Gutz's competent book about one of Java's graphical user interface (GUI)-building technologies covers everything you'd want in a Swing book--layouts, events, all the components, and more. Gutz focuses on the interface components, detailing buttons, text elements, and tables. Throughout, his code is clear and easy to follow, and a chapter... |
|
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will... | | CCIE Security Exam Certification Guide (CCIE Self-Study)Official self-study test preparation guide for the CCIE Security written exam
Review all CCIE Security written exam topics, including:
- Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
- DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
| | HIPAA Security Implementation Version 1.0 (SANS Step-by-Step Series)Written for the IT staff in hospitals, this guide provides step-by-step direction on how to apply the required and addressable HIPAA Security implementation specifications into a comprehensive solution.
A “consensus project” of numerous computer security experts has culminated in a Guide for... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 |