Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Red Hat Linux Networking and System Administration (With CD-ROM)
Red Hat Linux Networking and System Administration (With CD-ROM)
Your Official Red Hat® Linux® Guide to Networking and System Administration

Reviewed by the experts at Red Hat, this in-depth guide delivers all the know-how you need to set up and manage a state-of-the-art Linux network.

Red Hat Linux experts Terry Collings and Kurt Wall start with the basics—network planning and Red...

Real-Time Concepts for Embedded Systems
Real-Time Concepts for Embedded Systems
'... a very good balance between the theory and practice of real-time embedded system designs.' —Jun-ichiro itojun Hagino, Ph.D., Research Laboratory, Internet Initiative Japan Inc., IETF IPv6 Operations Working Group (v6ops) co-chair 'A cl

Develop a working understanding of the common design patterns and program
...
VMware Cookbook: A Real-World Guide to Effective VMware Use
VMware Cookbook: A Real-World Guide to Effective VMware Use
If you want to gain insight into the real-world uses of VMware ESX and ESXi, this book provides scores of step-by-step solutions for working with these products in a wide range of network environments. You'll not only learn the basics -- how to pool resources from hardware servers, computer clusters, networks, and storage, and then distribute...
Professional Cocoa Application Security
Professional Cocoa Application Security

The first comprehensive security resource for Mac and iPhone developers

The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to...

Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Microsoft Exchange 2013 Cookbook
Microsoft Exchange 2013 Cookbook

Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise.

Overview

  • Deploy Microsoft Exchange 2013 in the real world
  • Understand...
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow...
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectives

Key Features

  • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
  • ...
Java 2: The Complete Reference, Third Edition
Java 2: The Complete Reference, Third Edition

The definitive guide to Java!

Master Java, the pre-eminent language of the Internet, and begin reaping the benefits of this secure, platform-independent programming language. Let #1 programming author Herb Schildt show you everything you need to develop, compile, debug, and run Java applications and applets. Covering all of Java 2,...

Pro SQL Server 2005 Database Design and Optimization
Pro SQL Server 2005 Database Design and Optimization

Pro SQL Server 2005 Database Design and Optimization will teach you effective strategies for designing proper databases. It covers everything from how to gather business requirements to logical data modeling and normalization. It then shows you how to implement your design on SQL Server 2005.

The authors also describe how to...

Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
Using Samba
Using Samba
Samba, the Server Message Block (SMB) server software that makes it relatively easy to integrate Unix or Linux servers into networks of Microsoft Windows workstations, has to date been mostly explained as an afterthought. Most often, it's appeared in the latter chapters of books about Linux. It deserves better, and the authors of Using...
unlimited object storage image
Result Page: 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy