Home | Amazing | Today | Tags | Publishers | Years | Search 
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)

The OpenSSH suite of tools provides replacements for some of the common administrative tools used today such as telnet, FTP and the r-utilities; yet, these tools, considered insecure because they use clear-text communication over the network, are in still in common use. OpenSSH provides an encrypted channel between computers and remote servers...

Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond
Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond

"Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking."
—Tom Clark, Director, Technical Marketing, Nishan Systems

The Windows and enterprise storage markets are...

More iPhone Development with Swift: Exploring the iOS SDK
More iPhone Development with Swift: Exploring the iOS SDK

Interested in iPhone and iPad apps development? Want to learn more? Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, we have the perfect Swift-flavored book for you. (Source code has been updated to reflect Xcode 6.3.2 and Swift 1.2!)

The...

Best of TOC 2012
Best of TOC 2012

The acceleration of change and innovation in the publishing industry today is dizzying, and the pace can be overwhelming. At O’Reilly’s TOC New York Conference in February 2012, practitioners and executives from the publishing and tech...

HTML5 for Publishers
HTML5 for Publishers

HTML5 is revolutionizing the Web, and now it's coming to your ebook reader! With the release of the EPUB 3 specification, HTML5 support is officially a part of the EPUB standard, and publishers are able to take full advantage of HTML5's rich...

Cyber Conflict: Competing National Perspectives
Cyber Conflict: Competing National Perspectives

Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how...

Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
HP-UX CSE : Official Study Guide and Desk Reference
HP-UX CSE : Official Study Guide and Desk Reference

HP-UX CSE: Official Study Guide and Desk Reference is the definitive HP-UX CSE exam preparation guide and reference.

HP-approved coverage of all three CSE exams: CSE HP-UX Advanced System Administration, CSE High Availability Using HP-UX...

Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Game Development and Production (Wordware Game Developer's Library)
Game Development and Production (Wordware Game Developer's Library)
Writing comprehensive design documents, accurately estimating tasks and schedules, setting up a comprehensive QA planthese are all important aspects of the game development process that are often underplanned. Game company executive Erik Bethke provides a guidebook...
The Definitive Guide to symfony
The Definitive Guide to symfony
Developing a new web application should not mean reinventing the wheel. Thats why a framework is an essential item in your development toolbox. It helps you respect coding standards; write bulletproof, maintainable code; and focus on business rules rather than waste time on repetitive tasks. This book introduces you to symfony, the leading...
Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy