Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Cisco Remote Access Networks
Building Cisco Remote Access Networks
Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's...
Absolute BSD: The Ultimate Guide to FreeBSD
Absolute BSD: The Ultimate Guide to FreeBSD
    Welcome to Absolute BSD! This book is a one-stop shop for new UNIX administrators who want to build, configure, and manage dedicated FreeBSD servers. It will also be useful for those folks who want to run FreeBSD on their desktop or combined desktop/server systems.
    By the time you finish this book, you
...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Broadband Bible, Desktop Edition
Broadband Bible, Desktop Edition

It’s better with broadband, and you can do it...

Whether you need Internet access to work from home, operate a home-based business, run a small business, or simply enjoy all the wonders of the Web, broadband is better. This guide makes it easy to choose among the many broadband options, get connected, set up...

Pro Nagios 2.0 (Expert's Voice in Open Source)
Pro Nagios 2.0 (Expert's Voice in Open Source)
Who Should Read This Book?
This book is an introductory guide to Nagios 2.0. It presumes no prior knowledge of Nagios
and indeed focuses entirely (with minor digressions) on the current version of Nagios.Itis
designed for system administrators,operations managers,IT managers,and support staff
...
JavaScript in 10 Steps or Less
JavaScript in 10 Steps or Less
Since the mid-1990s when Netscape introduced version 2 of its flagship Netscape Navigator browser, JavaScript has been part of the Web development landscape. Providing a mechanism to implement dynamic interactivity in the browser, without connecting to the server, JavaScript is at the core of the Dynamic HTML model, which allows today’s...
SUSE Linux 9 Bible
SUSE Linux 9 Bible
If SUSE Linux 9 can do it, you can do it, too ...

SUSE is the oldest commercial Linux distribution, favored in Europe and rapidly gaining popularity in the United States. Whether you're just discovering Linux or switching from another distribution, this comprehensive reference gives you not only the "how-to" information, but also...

XQuery: The XML Query Language
XQuery: The XML Query Language
From corporate IT departments to academic institutions, XML has become the language of choice for storing and transmitting data across diverse application domains. XQuery, an XML Query Language invented by the World Wide Web Consortium, offers a powerful, standardized way to query all of that XML-encapsulated information. With its ability to...
Relational Database Index Design and the Optimizers
Relational Database Index Design and the Optimizers
Improve the performance of relational databases with indexes designed for today's hardware

Over the last few years, hardware and software have advanced beyond all recognition, so it's hardly surprising that relational database performance now receives much less attention. Unfortunately, the reality is that the improved hardware hasn't kept pace...

Information Security Policies and Actions in Modern Integrated Systems
Information Security Policies and Actions in Modern Integrated Systems
Information Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data,...
Microsoft Reporting Services in Action
Microsoft Reporting Services in Action
In archeology, the Rosetta stone was the key that solved the mysteries of Egyptian
hieroglyphics. I believe that with the release of Microsoft SQL Server 2000 Reporting
Services, code-named Rosetta, Microsoft gives organizations the key they need to
unlock the secrets of enterprise data and unleash the power hidden within....
Microsoft Windows 2000 Registry Handbook
Microsoft Windows 2000 Registry Handbook
Windows 2000 Registry Handbook helps administrators become more effective and productive. This handbook helps you use the registry for practical business purposes. While other books tend to discuss technology for the sake of technology, this book delivers timely, critical information that you can use to perform your job better. Topics covered are...
Result Page: 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy