Home | Amazing | Today | Tags | Publishers | Years | Search 
DocBook: The Definitive Guide (O'Reilly XML)
DocBook: The Definitive Guide (O'Reilly XML)
DocBook provides a system for writing structured documents using SGML or XML. It is particularly well-suited to books and papers about computer hardware and software, though it is by no means limited to them. DocBook is an SGML document type definition (...
The Definitive Guide to MySQL 5, Third Edition
The Definitive Guide to MySQL 5, Third Edition
This edition is an extensive revision of the second edition. Most of the changes relate to changes in the
MySQL server from version 4.1 to version 5.0. But there is also much that is new in areas surrounding
MySQL, including new programming interfaces (e.g., mysqli in PHP 5) and new administrative tools.
The most important new
...
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
Now there's a definitive insider's guide to planning, installing, configuring, and maintaining the newest version of the world's #1 firewall: Check Point™ FireWall-1® Next Generation™. Leading Check Point support authority Dameon Welch-Abernathy (a.k.a. PhoneBoy) offers exclusive hands-on tips, techniques, checklists, and...
Windows Server 2003 Bible
Windows Server 2003 Bible
If Windows Server 2003 can do it, you can do it, too ...

This comprehensive reference provides what you need to plan, install, configure, and maintain a Windows Server 2003 R2, SP1, operating system. Covering critical new SP1 security features, the new Windows Update service, and expanded Active Directory...

Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Security continues to be the predominant concern for any organization that is either on the Internet now or considering it. Nary a week passes where there isn't some new report of hackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or even stealing user passwords and credit card...
Beginning Databases with PostgreSQL: From Novice to Professional, Second Edition
Beginning Databases with PostgreSQL: From Novice to Professional, Second Edition
Welcome to Beginning Databases with PostgreSQL.
Early in our careers, we came to recognize the qualities of open-source software. Not only
is it often completely free to use, but it can also be of extremely high quality. If you have a problem,
you can examine the source code to see how it works. If you find a bug, you can fix it
...
Microsoft Encyclopedia of Networking, Second Edition
Microsoft Encyclopedia of Networking, Second Edition
Whether you're a system administrator, MCSA/MCSE certification candidate, or a CIO-here's definitive reference on the latest networking technologies and terminology. The superbly illustrated MICROSOFT ENCYCLOPEDIA OF NETWORKING, Second Edition, features thousands of entries-including many new entries and critical updates and revisions to the...
SSH, The Secure Shell: The Definitive Guide
SSH, The Secure Shell: The Definitive Guide
Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers,...
Red Hat Linux 7.2 Bible Unlimited Edition (With CD-ROM)
Red Hat Linux 7.2 Bible Unlimited Edition (With CD-ROM)
Linux was a phenomenon waiting to happen. The computer industry suffered from a rift. In the 1980s and
1990s, people had to choose between inexpensive, market−driven PC operating systems from Microsoft and
expensive, technology−driven operating systems such as UNIX. Free software was being created all over the
world, but
...
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Mac OS X Power Hound
Mac OS X Power Hound
You're about to gain insight into Mac OS X, an elegant operating system with Formula One power under the hood. This book is like your pit crew, helping you find easier, faster, and better ways of using the Finder, the Dock, the assortment of programs that come with Mac OS X, and a bunch of programs that don't. And if you want to become your own...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy