Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
The authoritative reference text on KAME and IPv6!

IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6
...
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
"I would purchase the books... since I am Ipv6 connected it would be a nice reference."..."I do think that if you buy one you will buy the other, assuming that the chapters are setup correctly." -Randall Stewart, Cisco Systems

"My immediate reaction was that I thought it would be better in one volume, BUT then I
...
Pro JavaScript Design Patterns
Pro JavaScript Design Patterns
As a web developer, you’ll already know that JavaScript™ is a powerful language, allowing you to add an impressive array of dynamic functionality to otherwise static web sites. But there is more power waiting to be unlocked--JavaScript is capable of full object-oriented capabilities, and by applying OOP principles, best practices, and...
Microsoft Windows Communication Foundation 4.0 Cookbook for Developing SOA Applications
Microsoft Windows Communication Foundation 4.0 Cookbook for Developing SOA Applications

The recipes in this book are easy to understand and follow as the author discusses real-world scenarios. The range of topics covered in this book will bring out the forward-thinking WCF developer in you. It is not a comprehensive reference to the whole of WCF, but a practical guide that boosts proficiency when working with the various...

Head First Design Patterns
Head First Design Patterns

You're not alone. At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take...

Paleoclimatology, Third Edition: Reconstructing Climates of the Quaternary
Paleoclimatology, Third Edition: Reconstructing Climates of the Quaternary

Paleoclimatology: Reconstructing Climates of the Quaternary, Third Edition―winner of a 2015 Textbook Excellence Award (Texty) from The Text and Academic Authors Association―provides a thorough overview of the methods of paleoclimatic reconstruction and of the historical changes in climate during the past three million...

Inside Microsoft Exchange Server 2007 Web Services
Inside Microsoft Exchange Server 2007 Web Services
Dive deep into the architecture of Exchange Web Servicesand master the intricacies for accessing data with the new, unifying API. Exchange Web Services offers new functionality, replacing old, disparate APIs. This practical guide introduces developers to Exchange Web Services. It includes comprehensive, in-depth coverage of the architecture and key...
Nginx 1 Web Server Implementation Cookbook
Nginx 1 Web Server Implementation Cookbook

Nginx is an open source high-performance web server, which has gained quite some popularity recently. Due to its modular architecture and small footprint, it has been the default choice for a lot of smaller Web 2.0 companies to be used as a load-balancing proxy server. It supports most of the existing backend web protocols such as FCGI,...

Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it...
PostgreSQL Server Programming - Second Edition
PostgreSQL Server Programming - Second Edition

Extend PostgreSQL using PostgreSQL server programming to create, test, debug, and optimize a range of user-defined functions in your favorite programming language

About This Book

  • Acquaint yourself with all the options to extend PostgreSQL using the programming language of your choice such as C++ and...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy