Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Command Line Administration Instant Reference
Windows Command Line Administration Instant Reference

Let’s face it, while GUI applications are nice and they do provide significant levels of hand holding, they’re cumbersome and inefficient. The command line is an essential part of the administrator experience—at least, if the administrator wants to go home at night and spend weekends somewhere other than work. Using...

Professional WordPress Plugin Development
Professional WordPress Plugin Development

DEAR READER, thank you for picking up this book! You have probably heard about WordPress already, the most popular self - hosted content management system (CMS) and blogging software in use today. WordPress powers literally millions of Web sites on the Internet, including high profi le sites such as TechCrunch and CNN ’ s blog....

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Programming Amazon EC2
Programming Amazon EC2

Thank you for picking up a copy of this book. Amazon Web Services (AWS) has amazed everyone: Amazon has made lots of friends, and all its “enemies” are too busy admiring AWS to do much fighting back. At the moment, there is no comparable public Infrastructure as a Service (IaaS); AWS offers the services at a scale that has...

Enterprise Service Computing: From Concept to Deployment
Enterprise Service Computing: From Concept to Deployment

The developed economy is shifting from being manufacturing based to services based. Different from the traditional manufacturing business, the services business is more complicated and dynamic, and end-user driven rather than product driven. To stay competitive, an enterprise thus has to rethink its business strategies and revamp its...

APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)
APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)

The objective of APM Best Practices: Realizing Application Performance Management is to establish reliable application performance management (APM) practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances. It's important to balance long-term goals with short-term deliverables, but...

Twilight of the Machines
Twilight of the Machines

“John Zerzan can now credibly claim the honor of being America’s most famous anarchist. His writing is sharp, uncompromising, and tenacious.”—Derrick Jensen, Utne Reader

The mentor of the green anarchist and neo-primitive movements is back with his first book in six years, confronting...

The Outlaws: A Presidential Agent Novel
The Outlaws: A Presidential Agent Novel

The #1 New York Times-bestselling series returns-and the stakes have never been higher.

Charlie Castillo's secret unit has been disbanded-but that doesn't mean he's out of business. As experience has painfully shown him, there are many things the intelligence community can't do, won't do, or
...

Landscapes of Mars: A Visual Tour
Landscapes of Mars: A Visual Tour

Practically next door to us in our Solar System, Mars is the most Earth-like of all the worlds held in perpetual motion by the Sun’s gravity. It is a planet that has fascinated and intrigued humans since prehistoric times. The Greeks named it Ares, after their god of war. The connection was easy to make because of the planet’s...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Pro Puppet
Pro Puppet

The lives of system administrators and operations staff often revolve around a series of repetitive tasks: configuring hosts, creating users, and managing applications, daemons, and services. Often these tasks are repeated many times in the life cycle of one host, from building to decommissioning, and as new configuration is added or...

Pro DNS and BIND 10
Pro DNS and BIND 10

Every time you get e-mail, every time you access a web page, you use the Domain Name System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day. Every one of those 2 billion requests originate from a DNS that supports a group of local users, and every one of them is finally answered by a DNS server that may...

Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy