Home | Amazing | Today | Tags | Publishers | Years | Search 
The Real Sexy, Smart and Strong: 30 Tips to Boost Confidence, Get Fit and Feel Great, Inside and Out
The Real Sexy, Smart and Strong: 30 Tips to Boost Confidence, Get Fit and Feel Great, Inside and Out

"My life’s passion is to connect people all over the world with their success potential. Patch’s book confirms just how smart exercise is—for your success and for keeping every part of your life in top condition. A must-read for everyone!"
—Jack Canfield, Co-creator, of The Success
...

Comparing and Merging Files with GNU diff and patch
Comparing and Merging Files with GNU diff and patch
This manual describes how to use GNU diff and patch to compare and merge files.

GNU diff and patch are free software. The term "free software" is sometimes misunderstood — it has nothing to do with price. It is about freedom. It refers to your freedom to run, copy, distribute, study, change and improve the software. With
...
Absolute BSD: The Ultimate Guide to FreeBSD
Absolute BSD: The Ultimate Guide to FreeBSD
    Welcome to Absolute BSD! This book is a one-stop shop for new UNIX administrators who want to build, configure, and manage dedicated FreeBSD servers. It will also be useful for those folks who want to run FreeBSD on their desktop or combined desktop/server systems.
    By the time you finish this book, you
...
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.
...
Pro SMS 2003
Pro SMS 2003
Systems Management Server (SMS) 2003 is the fifth revision of Microsoft’s product. Since it first appeared, its function and form have undergone vast changes. The 1.2 version made a big impact in the industry. It became a somewhat usable and stable, though temperamental, product. Some enterprises that invested their time and effort in this...
Configuring IPCop Firewalls: Closing Borders with Open Source
Configuring IPCop Firewalls: Closing Borders with Open Source
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for...
Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
Microsoft Access 2002 Bible BK+CD
Microsoft Access 2002 Bible BK+CD
"The Best book out there … I used this book so much I wore out the binding."—Don Dimon, MCSE, MCP+I, Senior Programmer/Analyst If Access 2002 can do it, you can do it too … Client lists. Sales figures. Product inventories. In today's networked, Internet-everywhere world, you need to get a grip on your data — and...
Linux Programming Unleashed
Linux Programming Unleashed
Linux Programming Unleashed is a complete and comprehensive reference for intermediate to advanced Linux developers that covers every possible use of Linux. Topics include: Core Linux Programming; Interprocess Communication; Device Drivers; Development Tools (make, Emacs, diff and patch, etc.); Programming the User Interface; programming...
Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy