Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Next-Generation Network Services
Next-Generation Network Services

A guide to building service-oriented networks to differentiate and grow your business 

  • Understand the changing landscape of the telecommunications industry and what technologies can lead to business and revenue growth

  • Examine the...

J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

Apache Security
Apache Security

This all-purpose guide for locking down Apache arms readers with all the information they need to securely deploy applications. Administrators and programmers alike will benefit from a concise introduction to the theory of securing Apache, plus a wealth of practical advice and real-life examples. Topics covered include...

Cryptography for Dummies
Cryptography for Dummies

Protect yourself and your business from online eavesdroppers—it’s easier than you think! If you were hoping for a flame-throwing watch or flying a car, we’re sorry—this isn’t James Bond’s equipment manual. Cryptography is a common-sense way to secure stuff on the Internet, and this friendly guidebook makes...

Mastering Nginx
Mastering Nginx

Written for experienced systems administrators and engineers, this book teaches you from scratch how to configure Nginx for any situation. Step-by-step instructions and real-world code snippets clarify even the most complex areas.

Overview

  • An in-depth configuration guide to help you understand how to best...
JBoss EAP6 High Availability
JBoss EAP6 High Availability

From the basic uses of JBoss EAP6 through to advanced clustering techniques, this book is the perfect way to learn how to achieve a system designed for high availability. All that's required is some basic knowledge of Linux/Unix.

Overview

  • A thorough introduction to the new domain mode provided by...
Qmail Quickstarter: Install, Set Up and Run your own Email Server
Qmail Quickstarter: Install, Set Up and Run your own Email Server

A fast-paced and easy-to-follow, step-by-step guide that gets you up and running quickly

  • Qmail Basics
  • Storing and retrieving of emails
  • Virtualisation
  • Filtering Spam
  • Hosting Multiple Domains, Encryption, and Mailing Lists

In Detail

This book...

Microsoft IIS 6.0: Administrator's Pocket Consultant
Microsoft IIS 6.0: Administrator's Pocket Consultant

This precise pocket-sized guide delivers immediate answers for the day-to-day administration of Web servers running Microsoft Information Services (IIS) 6.0. Zero in on core IIS support procedures and everyday tasks using quick-reference tables, step-by-step instructions, and lists. You get the focused, streamlined information you need to...

Advanced FileMaker Pro 5.5: Techinques for Developers with CDR (Wordware FileMaker Library)
Advanced FileMaker Pro 5.5: Techinques for Developers with CDR (Wordware FileMaker Library)
We almost never read forewords or introductions, so we’ll try to be as brief as possible. There were several reasons for writing this book. As time has gone by and FileMaker has evolved into a more sophisticated development tool, the need for more advanced FileMaker reference materials has grown as well. We felt that while...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy