Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products

Start programming from scratch, no experience required. This beginners’ guide to software engineering starts with a discussion of the different editors used to create software and covers setting up a Docker environment. Next, you will learn about repositories and version control along with its uses. Now that you are ready to...

Using Samba, Second Edition
Using Samba, Second Edition
Using Samba, Second Edition is a comprehensive guide to Samba administration. This new edition covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores...
Mastering Mambo: E-Commerce, Templates, Module Development, SEO, Security, and Performance
Mastering Mambo: E-Commerce, Templates, Module Development, SEO, Security, and Performance
If you type "Mambo" into a search engine, you get a ton of hits. Testing this with Google
resulted in almost six million references. But only some of these concerned themselves with the Afro-Cuban style of music and dance made popular by the movie Dirty Dancing. Most lead to one of today's most popular content management systems,
...
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

Pragmatic Version Control: Using Subversion (The Pragmatic Starter Kit Series) (2nd Edition)
Pragmatic Version Control: Using Subversion (The Pragmatic Starter Kit Series) (2nd Edition)
This book covers the theory behind version control and how it can help developers become more efficient, work better as a team, and keep on top of software complexity. Version control, done well, is your "undo" button for the project: nothing is final, and mistakes are easily rolled back.

This book describes Subversion 1.3, the...

Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Microsoft Outlook 2007 Bible
Microsoft Outlook 2007 Bible
Discover all the ways Outlook can make your life easier

Outlook has been called the Swiss army knife of applications, and with good reason. In one handy package, you get the tools you use constantly—e-mail, a calendar and appointment book, a contacts list, a to-do list, and more. Learn to use them together, and you have a sophisticated...

Mobile Computing Handbook
Mobile Computing Handbook
The debut of small, inexpensive, yet powerful portable computers has coincided with the exponential growth of the Internet, making it possible to access computing resources and information at nearly any location at almost any time. This new trend, mobile computing, is poised to become the main technology driver for a decade to come. There are many...
C# 3.0 Unleashed: With the .NET Framework 3.5
C# 3.0 Unleashed: With the .NET Framework 3.5
Whether you need an approachable on-ramp to .NET or you want to enhance your skills, C# 3.0 Unleashed is a comprehensive, in-depth guide to the solutions you seek. You’ll learn to do more with the new tools that are available, including Visual Studio 2008 and the .NET Framework Class Libraries. Throughout this book, you’ll get a...
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
Enterprise Recipes with Ruby and Rails
Enterprise Recipes with Ruby and Rails
Enterprise Recipes with Ruby and Rails helps you to overcome typical obstacles hidden in every enterprise's infrastructure. It doesn't matter if your Rails application needs to access your company's message-oriented middleware or if it has to scan through tons of huge XML documents to get a missing piece of data. Ruby and Rails enable you...
unlimited object storage image
Result Page: 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy