|
|
|
|
|
UNIX(R) System Security: A Guide for Users and System Administrators
Many of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX. ... | | Advanced Linux NetworkingWith an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful... | | J2EE Platform Web ServicesBuild robust, scalable, end-to-end business solutions with J2EE(TM) Web Services.
This is the definitive practitioner's guide to building enterprise-class J2EE Web Services that integrate with any B2B application and interoperate with any legacy system. Sun senior architect Ray Lai introduces 25... |
|
Sams Teach Yourself Microsoft Office Access 2003 in 24 HoursIn just 24 lessons of one hour or less, you will be able to work with and design your own Access databases. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Access 2003 and all its components from the ground up.
Welcome to Sams Teach Yourself Microsoft Office... | | | | Network Security Foundations : Technology Fundamentals for IT SuccessThe world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the... |
|
|
|
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 |