 |
|
|
|
|
 OS X for Hackers at Heart: The Apple of Every Hacker's EyeThe sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research... |  |  |  |  Configuring Windows 2000 Without Active DirectoryIn Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to... |
|
 Deploying Windows 2000 with Support ToolsVisually, Windows 2000 is similar to previous versions of Windows. Its extensive new functionality, the overriding goal of which is to reduce an organization's "total cost of ownership," however, makes the system administrator's life easier. This translates to quicker software installation, more efficient management, and easier... |  |  The Best Damn Windows Server 2008 Book Period, Second EditionIn depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.
The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to... |  |  Botnets: The Killer Web AppThis is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world... |
|
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 |