Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Backup with Bacula [How-to]
Network Backup with Bacula [How-to]

In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.

"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would
...

C++ Standard Library Quick Reference
C++ Standard Library Quick Reference

This quick reference is a condensed guide to the essential data structures, algorithms, and functions provided by the C++ Standard Library. Used by millions of C++ programmers on a daily basis, the C++ Standard Library features core classes for strings, I/O streams, and various generic containers, as well as a comprehensive set of algorithms...

Snort Cookbook
Snort Cookbook
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an...
Learning Java
Learning Java

Version 5.0 of the Java 2 Standard Edition SDK is the most important upgrade since Java first appeared a decade ago. With Java 5.0, you'll not only find substantial changes in the platform, but to the language itself-something that developers of Java took five years to complete. The main goal of Java 5.0 is to make it easier...

Learning Facebook Application Development
Learning Facebook Application Development
Using Facebook Applications, developers can add custom features to one of the most popular websites in the world. Facebook is the biggest social network among college students, and is gaining ground among professionals too. Facebook applications enable you to add new ways for users to interact with each other using Facebook.

Facebook...

Data Protection for Photographers: A Guide to Storing and Protecting Your Valuable Digital Assets
Data Protection for Photographers: A Guide to Storing and Protecting Your Valuable Digital Assets

All photographers, both amateur and professional, are faced with the important issues of data protection and storage. Without knowledge of the options, tools, and procedures for safe and effective image protection and storage, photographers run the serious risk of losing their image files. This book offers critical information about the best...

Biopharmaceuticals in Plants: Toward the Next Century of Medicine
Biopharmaceuticals in Plants: Toward the Next Century of Medicine

Transgenic plants present enormous potential to become one of the most cost-effective and safe systems for large-scale production of proteins for industrial, pharmaceutical, veterinary, and agricultural uses. Over the past decade, much progress has been made with respect to the development of vaccines, antibodies, and other therapeutic...

Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do. But you can also use shell scripts for many other essential (and not-so-essential) tasks.

This second edition of Wicked Cool
...
Corporate Blogging For Dummies
Corporate Blogging For Dummies

Establish a successful corporate blog to reach your customers

Corporate blogs require careful planning and attention to legal and corporate policies in order for them to be productive and effective. This fun, friendly, and practical guide walks you through using blogging as a first line of communication to customers and...

Programming in Go: Creating Applications for the 21st Century (Developer's Library)
Programming in Go: Creating Applications for the 21st Century (Developer's Library)

Your Hands-On Guide to Go, the Revolutionary New Language Designed for Concurrency, Multicore Hardware, and Programmer Convenience

 

Today’s most exciting new programming language, Go, is designed from the ground up to help you easily leverage...

OpenStack Cloud Security
OpenStack Cloud Security

Build a secure OpenStack cloud to withstand all common attacks

About This Book

  • Design, implement, and deliver a safe and sound OpenStack cluster using best practices
  • Create a production-ready environment and protect your data on the cloud
  • A step-by-step tutorial packed with...
unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy