Home | Amazing | Today | Tags | Publishers | Years | Search 
Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Oracle DBA on UNIX and Linux (Kaleidoscope)
    Oracle DBA on UNIX and Linux (Kaleidoscope)
    Oracle DBA on Unix and Linux provides all the information needed to install, support, tune, and upgrade Oracle databases on the UNIX and Linux platforms. Maintain a robust, mission-critical Oracle8i database. This book provides administrative solutions for the day-to-day DBA. You'll learn how to install the database for maximum efficiency,...
    Clustering Windows Server: A Road Map for Enterprise Solutions
    Clustering Windows Server: A Road Map for Enterprise Solutions
    During the final decade of the twentieth century, Microsoft achieved historic levels of marketing success in the computing business. Microsoft offered an alternative so economically appealing to the computing industry that resistance seemed futile in all but a few cases.

    Two questions remain. First, “Is there a solution to the
    ...
    Sams Teach Yourself Visual C++.NET in 21 Days (2nd Edition)
    Sams Teach Yourself Visual C++.NET in 21 Days (2nd Edition)
    Sams Teach Yourself Visual C++.NET in 21 Days, 2nd Edition is a time-saving guide walking you through Visual C++ tools and wizards for building applications and places VC++ in the context of the new Visual Studio.NET environment. This book emphasizes using Visual C++ tools and wizards to generate code. Code examples are augmented with C++ language...
    Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age (Studies in Computational Intelligence)
    Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age (Studies in Computational Intelligence)
    Creative Environments is a follow-up on the book Creative Space in the same series and by the same authors, serving this time as editors of a broader book on computational intelligence and knowledge engineering tools for supporting knowledge creation. This book contains four parts. The first part presents a further development of models of...
    The Multimedia Handbook (Blueprint Series)
    The Multimedia Handbook (Blueprint Series)
    Multimedia has become a very large and diverse field of activity. Its fuzzy boundaries merge into Information Technology. Disk storage, creative aspects like authoring, transmission protocols, standards, politics, and networks called superhighways are examples of activities where technical matters, creative work, applications, politics, and...
    Perspectives of Systems Informatics: 6th International Andrei Ershov Memorial Conference, PSI 2006, Novosibirsk, Russia, June 27-30, 2006
    Perspectives of Systems Informatics: 6th International Andrei Ershov Memorial Conference, PSI 2006, Novosibirsk, Russia, June 27-30, 2006
    This volume contains the final proceedings of the Sixth International Andrei Ershov Memorial Conference on Perspectives of System Informatics (PSI 2006), held in Akademgorodok (Novosibirsk, Russia), June 27-30, 2006.

    The conference was held to honour the 75th anniversary of a member of the Russian Academy of Sciences Andrei Ershov
    ...
    Soft Computing for Hybrid Intelligent Systems (Studies in Computational Intelligence)
    Soft Computing for Hybrid Intelligent Systems (Studies in Computational Intelligence)
    We describe in this book, new methods and applications of hybrid intelligent systems using soft computing techniques. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks, and evolutionary algorithms, which can be used to produce powerful hybrid intelligent systems. The book is organized in...
    Sams Teach Yourself XML in 24 Hours (2nd Edition)
    Sams Teach Yourself XML in 24 Hours (2nd Edition)
    Sams Teach Yourself XML in 24 Hours, Second Edition focuses on teaching the reader the fundamental concepts of XML using practical, hands-on examples. Rather than dwelling on dry theory, the book is filled with clear, real-world examples of how the technology can be used today.

    This book includes coverage of topics such as:

    * Displaying...

    UNIX and Linux Forensic Analysis DVD Toolkit
    UNIX and Linux Forensic Analysis DVD Toolkit
    The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

    This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
    ...
    The Zope Book (Landmark)
    The Zope Book (Landmark)
    The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope...
    Voice over Internet Protocol (VoIP) Security
    Voice over Internet Protocol (VoIP) Security
    "Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
    Result Page: 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy