Home | Amazing | Today | Tags | Publishers | Years | Search 
Home Networking Do-It-Yourself For Dummies
Home Networking Do-It-Yourself For Dummies

Fifty years ago, most households had only one television and one telephone. As the price of these technological marvels dropped, families began purchasing additional televisions and telephones — and the home network was born!

Think about it: Your televisions are basically networked together on a cable network. Okay, not a...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

PHP and MySQL 24-Hour Trainer
PHP and MySQL 24-Hour Trainer

PHP IS A POPULAR PROGRAMMING LANGUAGE that powers many websites. It originally started out as a way to make dynamic websites by generating HTML. Today it stands on its own as a generalpurpose programming language and is available on most web hosting sites. Because of its roots, it is very easy to insert bits and pieces of PHP inside of...

Integrating PHP with Windows
Integrating PHP with Windows

PHP has changed the world: no other language has influenced and spurred web development so strongly. From simple home pages to social software and business applications to the largest global websites, PHP has played a leading role for years. Simultaneously, Microsoft and its Windows operating system has made computers available to all...

Professional SharePoint 2010 Cloud-Based Solutions (Wrox Programmer to Programmer)
Professional SharePoint 2010 Cloud-Based Solutions (Wrox Programmer to Programmer)

THE “CLOUD” IS ONE OF THE MOST tossed-around words these days in any IT conversation. But what does it mean? And what are the implications of the cloud for SharePoint? In fact, there are many implications for SharePoint with the cloud, ranging from extending existing solutions to use code or services that are deployed to the...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

VMware Horizon 6 Desktop Virtualization Solutions
VMware Horizon 6 Desktop Virtualization Solutions

Plan, design, and secure your virtual desktop environments with VMware Horizon 6 View

About This Book

  • Design a successful solution to deliver Windows desktops and applications as a service
  • Provide redundancy for components and design a backup solution and disaster recovery plan to protect...
Prehospital Trauma Care
Prehospital Trauma Care

Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,
...

Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators
Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators

The definitive guide to administering a Red Hat Enterprise Linux 6 network

Linux professionals who need a go-to guide on version 6 of Red Hat Enterprise Linux (RHEL) will find what they need in this comprehensive Sybex book. It covers RHEL administration in detail, including how to set up and manage web and mail services,...

Linux Server Security: Hack and Defend
Linux Server Security: Hack and Defend

Learn how to attack and defend the world’s most popular web server platform

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server...

The Windows 10 Productivity Handbook: Discover Expert Tips, Tricks, and Hidden Features in Windows 10
The Windows 10 Productivity Handbook: Discover Expert Tips, Tricks, and Hidden Features in Windows 10
Use the tricks and hidden features in this guide to become more productive with Windows 10. You will save time, achieve more, and feel in control like never before.

Author Mike Halsey is a Microsoft MVP (Most Valuable Professional) awardee and technical expert. As the author of Windows 7, 8, and 10 Troubleshooting
...
Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy