Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
TCP/IP Network Administration
TCP/IP Network Administration
This book is intended for everyone who has a UNIX computer connected to a TCP/IP network. This
obviously includes the network managers and the system administrators who are responsible for setting
up and running computers and networks, but it also includes any user who wants to understand how his
or her computer communicates with
...
The Definitive Guide to GCC, Second Edition
The Definitive Guide to GCC, Second Edition

The GNU Compiler Collection (GCC) offers a variety of compilers for different programming languages including C, C++, Java, Fortran, and Ada. The Definitive Guide to GCC, Second Edition has been revised to reflect the changes made in the most recent major GCC release, version 4. Providing in-depth information on GCC's enormous...

grep Pocket Reference
grep Pocket Reference
grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Core Java™ 2 Volume I - Fundamentals, Seventh Edition
Core Java™ 2 Volume I - Fundamentals, Seventh Edition

In late 1995, the Java programming language burst onto the Internet scene and gained instant celebrity status. The promise of Java technology was that it would become the universal glue that connects users with information, whether that information comes from web servers, databases, information...

Apache Server 2 Bible
Apache Server 2 Bible
"Kabir has done it again! The Apache Server 2 Bible is an invaluable reference for both beginning and experienced administrators." —Elizabeth Zinkann, Sys Admin Magazine Contributing Editor and Review Columnist
  • Configure Apache Server for a Linux/Unix or Win32 system
  • Leverage Apache using SSI, CGI, PHP,...
Microsoft  Windows  Communication Foundation Step by Step
Microsoft Windows Communication Foundation Step by Step

Your hands-on, step-by-step guide to building next-generation connected applications.

Teach yourself the essentials of Windows Communication Foundation-one step at a time. With this practical tutorial, you get hands-on guidance for creating the Web services you need to implement robust business applications for Windows.

Discover...

Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
Now there's a definitive insider's guide to planning, installing, configuring, and maintaining the newest version of the world's #1 firewall: Check Point™ FireWall-1® Next Generation™. Leading Check Point support authority Dameon Welch-Abernathy (a.k.a. PhoneBoy) offers exclusive hands-on tips, techniques, checklists, and...
Programming C#, Third Edition
Programming C#, Third Edition
The new edition of Programming C# focuses on the features and programming patterns that are new to the C# language and fundamental to the programming of web services and web applications on the .NET platform. Newly updated for version 1.1 of the .NET Framework and Visual Studio .NET 2003, the book features new tips & tricks plus answers to...
Red Hat Fedora Linux Secrets
Red Hat Fedora Linux Secrets
Learn how to release the full potential of Red Hat Fedora Linux and install the latest release of Fedora Core (FC4) with this comprehensive guide. Within these pages, you'll be privy to valuable secrets contained in FC4: yum, up2date, mandatory access control with Security Enhanced Linux, and improved device handling with udev. You'll go behind the...
Solaris Security
Solaris Security
At last, a security book just for Solaris and UNIX(r) system administrators. Learn
the specifics for making your system secure, whether it's an organization-wide
network or a standalone workstation. Expert author Peter Gregory has managed
security for everything from top-secret corporate research facilities to casinos.
...
Pro Bash Programming: Scripting the GNU/Linux Shell (Expert's Voice in Linux)
Pro Bash Programming: Scripting the GNU/Linux Shell (Expert's Voice in Linux)

The bash shell is a complete programming language, not merely a glue to combine external Linux commands. By taking full advantage of shell internals, shell programs can perform as snappily as utilities written in C or other compiled languages. And you will see how, without assuming Unix lore, you can write professional bash 4.0 programs through...

unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy