Home | Amazing | Today | Tags | Publishers | Years | Search 
TCP/IP Network Administration
TCP/IP Network Administration
This book is intended for everyone who has a UNIX computer connected to a TCP/IP network. This
obviously includes the network managers and the system administrators who are responsible for setting
up and running computers and networks, but it also includes any user who wants to understand how his
or her computer communicates with
...
Professional Portal Development with Open Source Tools: JavaTM Portlet API, Lucene, James, Slide
Professional Portal Development with Open Source Tools: JavaTM Portlet API, Lucene, James, Slide
Open source technology enables you to build customized enterprise portal frameworks with more flexibility and fewer limitations. This book explains the fundamentals of a powerful set of open source tools and shows you how to use them.

An outstanding team of authors provides a complete tutorial and reference guide to Java Portlet API, Lucene,...

Six Sigma--The First 90 Days
Six Sigma--The First 90 Days
The new Six Sigma has had no less than a dazzling debut, starting in late 1994 with AlliedSignal. Originated in 1987 at Motorola, Six Sigma was adopted by very few companies, though it was not taken very seriously. Only after AlliedSignal (now known as Honeywell) demonstrated Six Sigma's effectiveness in redefining a company, achieving dramatic...
Advanced C# Programming
Advanced C# Programming

Your Definitive Professional Resource

Build solutions for the Microsoft .NET platform quickly and easily with C#--an efficient, object-oriented language. Advanced C# Programming thoroughly explains real-world solutions you can apply to a wide range of business applications or to programming problems. This book also reviews...

Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Developing Java Beans (Java Series)
Developing Java Beans (Java Series)
Java Beans is the most important new development in Java this year. Beans is the next generation of Java technology that not only adds features the language lacked, but also lets Java programs interoperate with a number of development environments. The initial release includes a bridge for Microsoft's ActiveX/COM; future releases will include...
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools

A Toolkit for IT Professionals

Whether you work for a publicly traded or pre-IPO company or as an IT consultant, you are familiar with the daunting task of complying with the Sarbanes-Oxley Act. You have no doubt seen the hour and dollar estimates for compliance go up...

Sams Teach Yourself Crystal Reports 9 in 24 Hours
Sams Teach Yourself Crystal Reports 9 in 24 Hours

Sams Teach Yourself Crystal Reports X in 24 Hours will guide the Crystal Reports users through conceptual topics, such as understanding data sources, to creating simple reports using the provided report wizards to custom reporting creation, modification and design techniques. This book will cover the latest version of Crystal Reports. The...

Advances in Applied Artificial Intelligence (Computational Intelligence and Its Applications)
Advances in Applied Artificial Intelligence (Computational Intelligence and Its Applications)
Discussion on the nature of intelligence long pre-dated the development of the
electronic computer, but along with that development came a renewed burst of investigation
into what an artificial intelligence would be. There is still no consensus on how
to define artificial intelligence: Early definitions tended to discuss the type of
...
Building DMZs for Enterprise Networks
Building DMZs for Enterprise Networks
During the course of the last few years, it has become increasingly evident that there is
a pronounced need for protection of internal networks from the outside world. As
machine technologies have improved and extensive shifts in the functions that a user
can accomplish through more user-friendly interfaces have occurred, many more
...
Practical DV Filmmaking, Second Edition
Practical DV Filmmaking, Second Edition
Since this book was first published in its first edition in 2002, it appeared to be prepared for the brave
new world of the DV revolution. But in the accelerated development of current filmmaking, it later
needed much revising to reflect what could be termed the post-revolutionary DV world. Arrivals such
as streaming, web film and
...
Microsoft Visual C# 2005 Unleashed
Microsoft Visual C# 2005 Unleashed

Setting the standard for a premium C# reference, Microsoft Visual C# 2005 Unleashed provides practical examples for virtually every aspect of the C# programming language. The book is structured for progressive learning, so it can be read cover-to-cover or used as a comprehensive reference guide....

Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy