|
|
|
|
|
CYA Securing IIS 6.0Network System Administrators operate in a high-stress environment, where the competitive demands of the business often run counter to textbook “best practices”. Design and planning lead times can be nonexistent and deployed systems are subject to constant end-runs; but at the end of the day, you, as the Administrator, are held... | | How to Cheat at Configuring VmWare ESX ServerThis book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine... | | |
|
Securing & Optimizing Linux: The Hacking SolutionThis 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system... | | Professional ASP.NET Web ServicesThis book will show you how to create high-quality Web Services using ASP.NET. It describes the standards that are core to the Web Services architecture and examines how these standards are integrated into ASP.NET. The processes involved in building and consuming Web Services are discussed along with in-depth code examples. The book concludes with... | | |
|
|
|
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |