Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures

This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed...

.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Excel 2007 Workbook For Dummies (Computer/Tech)
Excel 2007 Workbook For Dummies (Computer/Tech)
From formulas to functions to the latest features — practice and plan Excel tasks with ease

Confused by Excel? Want to make the most of its capabilities? No worries — this hands-on workbook gets you up to speed in a step-by-step manner. From navigating the new user interface and creating your first spreadsheet to using formulas,...

Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
Linux Networking Cookbook
Linux Networking Cookbook
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean...
Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Mastering Active Directory for Windows Server 2008
Mastering Active Directory for Windows Server 2008
Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000

If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical...

Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)

For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too!

  • Get more done faster, and become a true Linux guru by mastering the command line!
  • ...
Professional Android Open Accessory Programming with Arduino (Wrox Programmer to Programmer)
Professional Android Open Accessory Programming with Arduino (Wrox Programmer to Programmer)

Learn how to control your home or car from your Android smartphone - air conditioning, lights, entertainment systems, and more!

Android Open Accessory is a new, simple, and secure protocol for connecting any microcontroller-empowered device to an Android smartphone or tablet. This Wrox guide shows Android programmers how to...

Spring Security 3.1
Spring Security 3.1

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...

Apache Essentials: Install, Configure, Maintain (Pioneering Series)
Apache Essentials: Install, Configure, Maintain (Pioneering Series)

Apache is the most widely used web server on the Internet today, and that comes as no surprise—it’s open source and therefore free of charge, not to mention gloriously extensible. And it’s much more secure than other web servers.

So you’ve picked this book up and youre wondering what exactly makes it...

Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications
Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications

Get up and running with the fundamentals of Bitcoin and blockchain

Key Features

  • Learn quick, effective, and easy ways to master blockchain and Bitcoin
  • Understand the impact of decentralization and discover ways to tackle it
  • Explore the future of Bitcoin...
unlimited object storage image
Result Page: 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy