Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server Hacks
Windows Server Hacks
The tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT,...
The Linux Command Line: A Complete Introduction
The Linux Command Line: A Complete Introduction

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.

The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
How to Cheat at Managing Windows Server Update Services
How to Cheat at Managing Windows Server Update Services
Automate Patch Management Across Your Network If you manage a Microsoft Windows network, you probably find yourself overwhelmed at times by the sheer volume of updates and patches released by Microsoft for its products. You know these updates are critical to keep your network running efficiently and securely, but staying current...
Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.
...
VMware vSphere 6.5 Cookbook - Third Edition: Over 140 task-oriented recipes to install, configure, manage, and orchestrate various VMware vSphere 6.5 components
VMware vSphere 6.5 Cookbook - Third Edition: Over 140 task-oriented recipes to install, configure, manage, and orchestrate various VMware vSphere 6.5 components

Deploy and manage VMware vSphere 6.5 components with ease

Key Features

  • Simplified and to-the-point theory and practical recipes to deploy and manage vSphere 6.5
  • Discover the best ways to deploy stateless and stateful ESXi hosts and upgrade them
  • Storage and...
Laptops Just the Steps For Dummies (Computer/Tech)
Laptops Just the Steps For Dummies (Computer/Tech)
You’ll get the straight, simple lessons that you need to effectively use your Vista powered laptop in Laptops Just the Steps For Dummies. Get where you need to go with a minimum of steps! This book lays out a specific goal and helps you achieve it with a series of lessons, paired with tips and graphics to illustrate the task. You can...
Test- Driven Python Development
Test- Driven Python Development

Develop high-quality and maintainable Python applications using the principles of test-driven development

About This Book

  • Write robust and easily maintainable code using the principles of test driven development
  • Get solutions to real-world problems faced by Python developers
  • ...
Fruit and Vegetable Gardening
Fruit and Vegetable Gardening

Whether you have a kitchen garden, a spot in a community garden, a small vegetable patch, or just a collection of pots and window boxes, Fruit & Vegetable Gardening is an essential, comprehensive guidebook for growing your own fruits and veggies.

Offering all the basics, from soil preparation and organic manures, to...

Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy