Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
Linux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible
Learn all the command lines for all Linux shells in this one-stop guide

There's a lot to be said for going back to basics. Not only does this Bible give you a quick refresher on the structure of open-source Linux software, it also shows you how to bypass the hefty graphical user interface on Linux systems and start...

Perl Developer's Dictionary (Developer's Library)
Perl Developer's Dictionary (Developer's Library)
Perl Developer's Dictionary is a complete, well-organized reference to the Perl language and environment, including core syntax as well as Perl modules. Designed specifically for the experienced developer who needs a reference readily available on his or her desk to refer to on a daily basis, the book is extensively cross-referenced and indexed for...
OpenGL SuperBible: Comprehensive Tutorial and Reference (5th Edition)
OpenGL SuperBible: Comprehensive Tutorial and Reference (5th Edition)

OpenGL® SuperBible, Fifth Edition is the definitive programmer’s guide, tutorial, and reference for the world’s leading 3D API for real-time computer graphics, OpenGL 3.3. The best all-around introduction to OpenGL for developers at all levels of experience, it clearly explains both the API...

Fundamentals of Linux: Explore the essentials of the Linux command line
Fundamentals of Linux: Explore the essentials of the Linux command line

Develop a solid understanding of the important command-line tools and utilities in Linux

Key Features

  • Delve into the fundamentals of Linux
  • Explore and work with virtualization, command lines, and Bash shell scripts
  • Use special file permission flags such as...
TruCluster Server Handbook (HP Technologies)
TruCluster Server Handbook (HP Technologies)

The TruCluster Server Handbook authoritatively details how to plan, design, install, configure, and administer a cluster of Tru64 UNIX systems. The book explains how to configure and optimize hardware underlying a TruCluster server, including a TruCluster server, including storage servers so critical to running a high-end cluster...

Upgrading to PHP 5
Upgrading to PHP 5
This new book is targeted toward PHP developers who are already familiar with PHP 4. Upgrading to PHP 5 offers a concise appraisal of the differences between PHP 4 and PHP 5, a detailed look at what's new in this latest version, and an explanation of how these changes affect you. The book also covers more advanced...
Maya at a Glance
Maya at a Glance
Many years ago, I was a frustrated software engineer working in Silicon Valley. I was in a
very technical field, which I enjoyed, but I also had a strong desire to exercise my artistic
side. Writing code for UNIX workstations just didn’t satisfy that. I loved cartoons, so I
decided to take the
...
Special Edition Using Mac OS X Leopard
Special Edition Using Mac OS X Leopard
SPECIAL EDITION USING MAC OS X LEOPARD

 

THE ONLY MAC OS X LEOPARD BOOK YOU NEED

 

We crafted this book to grow with you, providing the reference material you need as...

Mainframe Basics for Security Professionals: Getting Started with RACF
Mainframe Basics for Security Professionals: Getting Started with RACF
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers...
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...

Beginning ASP.NET 1.1 with VB.NET 2003
Beginning ASP.NET 1.1 with VB.NET 2003
This book teaches you how to build custom ASP.NET Web sites from the ground up. An expert team of authors uses its extensive ASP.NET programming experience to give you hands-on instruction in the best way to create Web sites with ASP.NET. This completely updated edition features new examples, and all code is written and tested for ASP.NET version...
unlimited object storage image
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy