Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro DNS and BIND
Pro DNS and BIND
Every time you get e-mail, every time you access a web page, you use the Domain Name
System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day.
Every one of those 2 billion requests originate from a DNS that supports a group of local users,
and every one of them is finally answered by a DNS server
...
Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
Essential Windows NT System Administration
Essential Windows NT System Administration

Windows NT systems are often said to "manage themselves." This book is for those times when things don't quite work out that way, when somebody who knows what's going on needs to intervene.Essential Windows NT System Administration helps you manage Windows NT systems as productively as possible, making the...

CYA Securing IIS 6.0
CYA Securing IIS 6.0
Network System Administrators operate in a high-stress environment, where the competitive demands of the business often run counter to textbook “best practices”. Design and planning lead times can be nonexistent and deployed systems are subject to constant end-runs; but at the end of the day, you, as the Administrator, are held...
How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
Networking Self-Teaching Guide: OSI, TCP/IP, LAN's, MAN's, WAN's, Implementation, Management, and Maintenance (Wiley Self Teaching Guides)
Networking Self-Teaching Guide: OSI, TCP/IP, LAN's, MAN's, WAN's, Implementation, Management, and Maintenance (Wiley Self Teaching Guides)
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find this a valuable and up-to-date resource. This hands-on guide is designed so that you can select,...
Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
Professional ASP.NET Web Services
Professional ASP.NET Web Services
This book will show you how to create high-quality Web Services using ASP.NET. It describes the standards that are core to the Web Services architecture and examines how these standards are integrated into ASP.NET. The processes involved in building and consuming Web Services are discussed along with in-depth code examples. The book concludes with...
Java EE 8 Development with Eclipse: Develop, test, and troubleshoot Java Enterprise applications rapidly with Eclipse, 3rd Edition
Java EE 8 Development with Eclipse: Develop, test, and troubleshoot Java Enterprise applications rapidly with Eclipse, 3rd Edition

Develop and deploy fully functional applications and microservices utilising Tomcat, Glassfish servers, Cloud and docker in Java EE 8

Key Features

  • Explore the complete workflow of developing enterprise Java applications
  • Develop microservices with Docker Container and...
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform

Efficiently deploy and manage Kubernetes clusters on a cloud

Key Features

  • Deploy highly scalable applications with Kubernetes on Azure
  • Leverage AKS to deploy, manage, and operations of Kubernetes
  • Gain best practices from this guide to increase efficiency...
Hacking the Code: ASP.NET Web Application Security
Hacking the Code: ASP.NET Web Application Security

This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of...

Logically Determined Design: Clockless System Design with NULL Convention Logic
Logically Determined Design: Clockless System Design with NULL Convention Logic
A Revolutionary New Digital System Design Methodology

Logically determined electronic system design is a viable solution to manage the growing complexity of digital design in today's industry. The author shows how this new clockless design methodology is essential for securing the future economic growth of the digital design industry by...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy