Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Windows Vista(TM) Resource Kit
Windows Vista(TM) Resource Kit
Get the definitive reference for deploying, configuring, and supporting Microsoft® Windows Vista(tm)--with expert insights from Microsoft Most Valuable Professionals (MVPs) and the Windows Vista Team. This official Microsoft RESOURCE KIT provides more than 1,500 pages of in-depth technical guidance on automating deployment; implementing...
Practice of System and Network Administration, The (2nd Edition)
Practice of System and Network Administration, The (2nd Edition)
The first edition of The Practice of System and Network Administration introduced a generation of system and network administrators to a modern IT methodology. Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to...
Perl 5 Quick Reference (Quick Reference Series)
Perl 5 Quick Reference (Quick Reference Series)
This book is a reference guide for the programming language called Perl. This book does not describe how to install Perl on your computer; if you do not already have Perl installed, this book will not be very useful!

Perl has many uses, especially in UNIX system administrative tasks, which is where Perl was born and grew up. The name
...
Professional Apache Tomcat 6 (WROX Professional Guides)
Professional Apache Tomcat 6 (WROX Professional Guides)
With this comprehensive resource, you'll uncover the ins-and-outs of installing, configuring, and running the Apache Tomcat server. This book not only provides a line-by-line analysis of configuration options, but also explores the features and capabilities of Tomcat. You'll then gain the skills to solve the type of problems that arise during all...
Computer Security: Art and Science
Computer Security: Art and Science
"This is an excellent text that should be read by every computer security professional and student." —Dick Kemmerer, University of California, Santa Barbara.

"This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!"

—Marvin
...
DB2 9 Fundamentals Certification Study Guide
DB2 9 Fundamentals Certification Study Guide

Starting with the certification process itself and ending with the concept of isolation levels and locking, this guide covers everything needed to know to pass the DB2 9 Fundamentals Certification Exam (Exam 730). The prerequisite for all intermediate and follow-on DB2 certifications, XML usage, basic table creation, a rich set of sample...

Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
Security Power Tools
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security...
GUI Bloopers 2.0: Common User Interface Design Don'ts and Dos
GUI Bloopers 2.0: Common User Interface Design Don'ts and Dos
The first edition of this book was written in 1998 and 1999. The common application platforms then were MacOS9, Windows98, Windows NT, early versions of Java Swing, and Unix or Linux with CDE/Motif. Although many of the bloopers covered in the first edition are as common now as they were in the late 1990s, the book was starting to look out of date...
Linux Programming by Example
Linux Programming by Example
Discusses how LINUX works at the system level by learning how and when to manipulate processes, send and catch signals, and use calls, and how to manipulate and read pipes and FIFOs. Softcover.

Linux Programming By Example introduces programmers with some background in C but no knowledge of the specifics of Linux programming
...
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy