 |
|
 Maximum Windows 2000 Security (Maximum Security)Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.
Topics include:
Physical & File System Security,
Password Security,
Malicious Code,
Windows 2000 Network Security Architecture and Professional... |  |  Oracle DBA on UNIX and Linux (Kaleidoscope)Oracle DBA on Unix and Linux provides all the information needed to install, support, tune, and upgrade Oracle databases on the UNIX and Linux platforms. Maintain a robust, mission-critical Oracle8i database. This book provides administrative solutions for the day-to-day DBA. You'll learn how to install the database for maximum efficiency,... |  |  Clustering Windows Server: A Road Map for Enterprise SolutionsDuring the final decade of the twentieth century, Microsoft achieved historic levels of marketing success in the computing business. Microsoft offered an alternative so economically appealing to the computing industry that resistance seemed futile in all but a few cases.
Two questions remain. First, “Is there a solution to the... |
|
 Sams Teach Yourself Visual C++.NET in 21 Days (2nd Edition)Sams Teach Yourself Visual C++.NET in 21 Days, 2nd Edition is a time-saving guide walking you through Visual C++ tools and wizards for building applications and places VC++ in the context of the new Visual Studio.NET environment. This book emphasizes using Visual C++ tools and wizards to generate code. Code examples are augmented with C++ language... |  |  |  |  The Multimedia Handbook (Blueprint Series)Multimedia has become a very large and diverse field of activity. Its fuzzy boundaries merge into Information Technology. Disk storage, creative aspects like authoring, transmission protocols, standards, politics, and networks called superhighways are examples of activities where technical matters, creative work, applications, politics, and... |
|
|
 UNIX and Linux Forensic Analysis DVD ToolkitThe only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account... |  |  The Zope Book (Landmark)The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope... |  |  Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |
|
| Result Page: 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 |