Home | Amazing | Today | Tags | Publishers | Years | Search 
Applied Java Patterns
Applied Java Patterns

A hands-on guide to design patterns for Java platform developers.

  • Pattern-based solutions for every stage of the development lifecycle
  • Documents 30 patterns, including the 23 core patterns for the Sun Certified Enterprise Architect exam
  • Describes pattern use within the Java APIs—including...
Great Jobs for Computer Science Majors 2nd Ed.
Great Jobs for Computer Science Majors 2nd Ed.

What can I do with a degree in computer science?

The first step toward the rest of your life starts with that question, and the answer is right here. Get on the right path now for a satisfying and rewarding career in computers by learning to match your skills and interests with exciting employment opportunities....

Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical,...

Windows 2000 Administration in a Nutshell : A Desktop Quick Reference
Windows 2000 Administration in a Nutshell : A Desktop Quick Reference
Anyone who installs Windows 2000, creates a user, or adds a printer is a 2000 system administrator. This book covers all the important day-to-day administrative tasks, and the tools for performing each task are included in a handy easy-to-look-up alphabetical reference. What's the same and what's different between the Windows 2000 and Windows NT...
Configuring Cisco Voice Over IP
Configuring Cisco Voice Over IP
Arming network administrators with a thorough understanding of Cisco’s current VoIP solutions and the means to put them to work, Configuring Cisco Voice Over IP, Second Edition demonstrates how to configure all of Cisco’s core VoIP products, among them Cisco CallManager software, Cisco 7910 series phones, and server-based IP PBXs. Now...
DNS on Windows 2000
DNS on Windows 2000
This special Windows-oriented edition of the classic DNS and BIND is a guide to one of the Internet's fundamental building blocks: the distributed host information database responsible for translating names into addresses, routing mail, and many other services. Covers server setup and maintenance along with...
Beginning Visual C#
Beginning Visual C#
By using this book with Visual Studio® .NET you’ll come to understand the fundamentals of the C# language and learn to program the .NET Framework. We’ll help you succeed – from your first steps in the language up to the point where you are ready to write real world C# applications.

With Beginning Visual C#, you will learn...

Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)

Telecommunications Essentials, Second Edition, provides a comprehensive overview of the rapidly evolving world of telecommunications. Providing an in-depth, one-stop reference for anyone wanting to get up to speed on the $1.2 trillion telecommunications industry,...

Telecommunications Essentials
Telecommunications Essentials
Telecommunications Essentials is an in-depth introduction to the rapidly growing world of telecommunications. The book provides a global perspective, which ensures a complete understanding of telecommunications technologies and standards worldwide. Providing a comprehensive, one-stop reference for anybody wanting to get...
XML: A Manager's Guide (2nd Edition)
XML: A Manager's Guide (2nd Edition)

Extensible Markup Language (XML) has revolutionized distributed computing. By providing a standard means for specifying the structure of information, XML enables sophisticated e-commerce systems and facilitates interoperable enterprise software. Knowing how to leverage XML's technical capabilities into business value has become...

Borland JBuilder Developer's Guide
Borland JBuilder Developer's Guide

JBuilder Developer's Guide provides comprehensive coverage of JBuilder from the practitioner's viewpoint. The authors develop a consolidated application throughout the chapters, allowing conceptual cohesion and illustrating the use of JBuilder to build 'real-world' applications. The examples can be compiled and run under JBuilder Personal...

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Result Page: 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy