Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Enterprise Security with EJB and CORBA(r)
Enterprise Security with EJB and CORBA(r)
"Leveraging their strong implemention and standards committee experience, the authors have delivered the definitive guide to enterprise distributed object security."–Wing K. Lee, Sprint

Enterprise Security with EJB and CORBA

With e-business and distributed components comes the need for a bold new approach to...

The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Microsoft SQL Server 2008 Administration with Windows PowerShell (Wrox Programmer to Programmer)
Microsoft SQL Server 2008 Administration with Windows PowerShell (Wrox Programmer to Programmer)

Secure, reliable, and scalable, SQL Server 2008 delivers a dynamic, smart, and productive data platform for all your data-related needs and offers many new features that will change how you administer a database server. Among these new features is the ability to use Windows PowerShell 2.0 scripts to automate and manage various aspects of the...

Telerik WPF Controls Tutorial
Telerik WPF Controls Tutorial

Telerik controls and Windows Presentation Foundation (WPF) are a winning combination, and this tutorial will give you the skills you need to create powerful applications. You'll need to know C#, SQL, and object-oriented design.

Overview

  • Display database information in the Telerik WPF controls
  • ...
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
Learn and master the new features in the JSF 2.3 MVC web framework in this definitive guide written by two of the JavaServer Faces (JSF) specification leads. The authors take you through real-world examples that demonstrate how these new features are used with other APIs in Java EE 8. You’ll see the new and exciting ways...
Zen and the Art of Information Security
Zen and the Art of Information Security
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable...
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

Getting Started with Citrix XenApp 6
Getting Started with Citrix XenApp 6

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure...

Campus Network Design Fundamentals (Cisco Press Fundamentals)
Campus Network Design Fundamentals (Cisco Press Fundamentals)

The all-in-one guide to the what, why, and how of modern campus network design

  • Provides a "readers digest" overview of modern technologies used to build resilient, scalable campus infrastructures

  • Shows readers how to build...

Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
unlimited object storage image
Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy