Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows 2000 Administration in a Nutshell : A Desktop Quick Reference
Windows 2000 Administration in a Nutshell : A Desktop Quick Reference
Anyone who installs Windows 2000, creates a user, or adds a printer is a 2000 system administrator. This book covers all the important day-to-day administrative tasks, and the tools for performing each task are included in a handy easy-to-look-up alphabetical reference. What's the same and what's different between the Windows 2000 and Windows NT...
Configuring Cisco Voice Over IP
Configuring Cisco Voice Over IP
Arming network administrators with a thorough understanding of Cisco’s current VoIP solutions and the means to put them to work, Configuring Cisco Voice Over IP, Second Edition demonstrates how to configure all of Cisco’s core VoIP products, among them Cisco CallManager software, Cisco 7910 series phones, and server-based IP PBXs. Now...
DNS on Windows 2000
DNS on Windows 2000
This special Windows-oriented edition of the classic DNS and BIND is a guide to one of the Internet's fundamental building blocks: the distributed host information database responsible for translating names into addresses, routing mail, and many other services. Covers server setup and maintenance along with...
Beginning Visual C#
Beginning Visual C#
By using this book with Visual Studio® .NET you’ll come to understand the fundamentals of the C# language and learn to program the .NET Framework. We’ll help you succeed – from your first steps in the language up to the point where you are ready to write real world C# applications.

With Beginning Visual C#, you will learn...

Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical,...

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)

Telecommunications Essentials, Second Edition, provides a comprehensive overview of the rapidly evolving world of telecommunications. Providing an in-depth, one-stop reference for anyone wanting to get up to speed on the $1.2 trillion telecommunications industry,...

XML: A Manager's Guide (2nd Edition)
XML: A Manager's Guide (2nd Edition)

Extensible Markup Language (XML) has revolutionized distributed computing. By providing a standard means for specifying the structure of information, XML enables sophisticated e-commerce systems and facilitates interoperable enterprise software. Knowing how to leverage XML's technical capabilities into business value has become...

Telecommunications Essentials
Telecommunications Essentials
Telecommunications Essentials is an in-depth introduction to the rapidly growing world of telecommunications. The book provides a global perspective, which ensures a complete understanding of telecommunications technologies and standards worldwide. Providing a comprehensive, one-stop reference for anybody wanting to get...
Adobe Acrobat 7 in the Office
Adobe Acrobat 7 in the Office
Offering a raft of Microsoft Office collaboration features (plus the ability to review and comment on Acrobat Procreated documents using just Reader), Acrobat is no longer just for pre-press and creative professionals. Acrobat can simplify workflows in all kinds of business settings. All you need is this handy guide to delineate those uses and show...
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
Lotus Notes and Domino 6 Programming Bible
Lotus Notes and Domino 6 Programming Bible
"This unmatched book is a must-have reference for Notes and Domino developers."
– John Hawkins, Editorial Director,
Lotus Advisor Magazine & Conference

If Lotus Notes and Domino 6 can do it, you can do it too...

Whether you’re an architect, developer, or administrator, this guidebook...

Result Page: 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy