Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Upgrading and Repairing Networks, Fourth Edition
Upgrading and Repairing Networks, Fourth Edition

Even if you aren't a networking professional, Upgrading and Repairing Networks explains those tough networking concepts in a way that won't make you reach for a bottle of aspirin, starting with the fundamentals and working through more advanced concepts. Now in its fourth edition, this industry classic networking reference gives you real world,...

IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

The Patient's Guide to Preventing Medical Errors
The Patient's Guide to Preventing Medical Errors
It is natural to feel apprehensive when facing a surgical procedure or entering a hospital to receive treatment for a newly diagnosed illness. Although a bit nervous, people assume that they will be safe. That assumption is wrong. A startling report revealed that it is far safer to fly on a commercial airliner than to be a patient in a hospital. In...
Network Security Architectures
Network Security Architectures

Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to...

Core Java™ 2 Volume II - Advanced Features, Seventh Edition
Core Java™ 2 Volume II - Advanced Features, Seventh Edition

Completely revised and up-to-date coverage of

  • Multithreadingincluding the java.util.concurrent library, locks, condition objects, futures, thread pools, thread-safe collections, threads and Swing

  • ...
Network Backup with Bacula [How-to]
Network Backup with Bacula [How-to]

In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.

"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would
...

C++ Standard Library Quick Reference
C++ Standard Library Quick Reference

This quick reference is a condensed guide to the essential data structures, algorithms, and functions provided by the C++ Standard Library. Used by millions of C++ programmers on a daily basis, the C++ Standard Library features core classes for strings, I/O streams, and various generic containers, as well as a comprehensive set of algorithms...

Snort Cookbook
Snort Cookbook
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an...
Learning Java
Learning Java

Version 5.0 of the Java 2 Standard Edition SDK is the most important upgrade since Java first appeared a decade ago. With Java 5.0, you'll not only find substantial changes in the platform, but to the language itself-something that developers of Java took five years to complete. The main goal of Java 5.0 is to make it easier...

Learning Facebook Application Development
Learning Facebook Application Development
Using Facebook Applications, developers can add custom features to one of the most popular websites in the world. Facebook is the biggest social network among college students, and is gaining ground among professionals too. Facebook applications enable you to add new ways for users to interact with each other using Facebook.

Facebook...

Data Protection for Photographers: A Guide to Storing and Protecting Your Valuable Digital Assets
Data Protection for Photographers: A Guide to Storing and Protecting Your Valuable Digital Assets

All photographers, both amateur and professional, are faced with the important issues of data protection and storage. Without knowledge of the options, tools, and procedures for safe and effective image protection and storage, photographers run the serious risk of losing their image files. This book offers critical information about the best...

Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy