|
|
|
|
No Plastic Sleeves: The Complete Portfolio Guide for Photographers and Designers
Your resume and cover letter, as well as a digital portfolio, business card and mailers, will function as the first contact and impression you make. These items will work to get your "foot in the door." Ultimately, however, it will be your portfolio book or online portfolio website that will land you the job. The creation of your... | | Inventors at Work: The Minds and Motivation Behind Modern Inventions
Inventors at Work: The Minds and Motivation Behind Modern Inventions is a collection of interviews with inventors of famous products, innovations, and technologies that have made life easier or even changed the way we live. All of these scientists, engineers, wild-eyed geniuses, and amateur technologists have dedicated their... | | |
|
Apache The Definitive Guide, 3rd EditionUpdated to cover the changes in Apache's latest release, 2.0, as well as Apache 1.3, this useful guide discusses how to obtain, set up, secure, modify, and troubleshoot the Apache software on both Unix and Windows systems. In addition to covering the installation and configuration of mod_perl and Tomcat, the book examines PHP,... | | Writing Security Tools and ExploitsExploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,... | | |
|
Test Driving Linux: From Windows to Linux in 60 SecondsFor years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you... | | Microsoft Tabular Modeling Cookbook
No prior knowledgeof tabular modeling is needed to benefit from this brilliant cookbook. This is the total guide to developing and managing analytical models using the Business Intelligence Semantic Models technology.
Overview
-
Develop tabular models for personal use
-
Learn about the modeling...
| | NTP Security: A Quick-Start Guide
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline.
NTP Security: A Quick-Start... |
|
|
|
Result Page: 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 |