|
|
|
|
AWS Certified Advanced Networking Official Study Guide: Specialty Exam
The official study guide for the AWS certification specialty exam
The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,... | | A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid ... | | Data Mining Tools for Malware Detection
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop... |
|
|
BusinessObjects: The Complete ReferenceImprove profitability and operations in your company by leveraging BusinessObjects with help from this comprehensive guidebook. Divided into three digestible sections, Business Objects: The Complete Reference will help you get fully acquainted with this sophisticated tool set, design and build a user-friendly interface, then reap... | | A UML Pattern Language (Macmillan Technology Series)This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called... | | Learning SQL on SQL Server 2005Anyone who interacts with today's modern databases needs to know SQL (Structured Query Language), the standard language for generating, manipulating, and retrieving database information. In recent years, the dramatic rise in the popularity of relational databases and multi-user databases has fueled a healthy demand for... |
|
Mac OS X 10.4 Tiger : Visual QuickStart GuideSo you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will... | | Cisco Security Specialist's Guide to PIX FirewallThe objective of this book is to provide you with a thorough understanding of the Cisco PIX firewalls.Whether you have administrative responsibilities or you are studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA), this comprehensive guide will be of value to you.The initial chapters cover the basics,... | | Buffer Overflow AttacksBuffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have... |
|
|
Result Page: 933 932 931 930 929 928 927 926 925 924 923 922 921 920 919 918 917 916 915 |