 |
|
 Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... |  |  Wireless SecurityGet full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless... |  |  |
|
|
|
 Sams Teach Yourself Samba in 24 HoursSams Teach Yourself Samba in 24 Hours is a tutorial designed to help you integrate Linux/UNIX-based systems with Windows-based systems. It has all the information and tools necessary for you to be up and running with Samba in 24 short lessons. Learn how to use Samba to its fullest potential. Topics range from introducing Samba and Samba... |  |  Using Sgml (Special Edition Using)SGML and markup languages can make your life easier. In this chapter, you learn:
- Why markup languages are so popular
- What SGML has to do with ISO and CALS
- How SGML makes information transportable
- How SGML protects your formatting and structure
- How SGML is already gaining
... |  |  Postfix (Other Sams)Networking guide to the Postfix Mail Transfer software package, showing how to configure Postfix for specific tasks, how to use external databases with Postfix, and how to migrate from Sendmail. Also explains e-mail protocols, setting up Postfix as an ISP or office mail server, and using list servers and Web mail interfaces with Postfix. Softcover.... |
|
| Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 |