|
|
|
|
|
|
Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from... | | | | UNIX Filesystems: Evolution, Design, and ImplementationA comprehensive look at the principles, functionality, and implementations of UNIX and Linux® filesystems
Every aspect of a network–storage, file transfers, backup–depends on the filesystem for structure, functionality, and integrity. Surprisingly, UNIX–the operating system of choice for mission-critical networks–has... |
|
Show Me Microsoft Office Access 2003Microsoft Office Access 2003 provides powerful new tools with which to manage data, find and retrieve information faster than ever, share information, and integrate solutions with server side products. Access 2003 incorporates some of the latest technologies such as XML and Microsoft SharePoint to extend data exchange over an intranet or the... | | Active Directory For Dummies (Computer/Tech)Fully updated with all the exciting AD enhancements!
Design and deploy Active Directory to simplify policy and security management
This is not your dad's AD! Whether you just need to upgrade your knowledge from previous versions or you're starting fresh with Active Directory, this... | | Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |