Home | Amazing | Today | Tags | Publishers | Years | Search 
Installing and Administering Linux, Second Edition
Installing and Administering Linux, Second Edition
An indispensable working resource for IT professionals moving to Linux-based network systems

More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand...

Canning Spam: You've Got Mail (That You Don't Want)
Canning Spam: You've Got Mail (That You Don't Want)
We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever...
The Mac OS X Command Line: Unix Under the Hood
The Mac OS X Command Line: Unix Under the Hood
Work More Quickly and Easily—and Learn Some New Tricks

The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major
...
Mac OS X Developer's Guide
Mac OS X Developer's Guide
As you begin developing for Mac OS X, you'll face major changes, lots of difficult decisions, and also some terrific opportunities. The Mac OS X Developer's Guide aims to do more than help you make the transition painlessly: It's dedicated to helping you capitalize on these opportunities and positively thrive in this new environment....
Active Directory For Dummies (Computer/Tech)
Active Directory For Dummies (Computer/Tech)

Fully updated with all the exciting AD enhancements!

Design and deploy Active Directory to simplify policy and security management

This is not your dad's AD! Whether you just need to upgrade your knowledge from previous versions or you're starting fresh with Active Directory, this...

Flex 3 in Action
Flex 3 in Action
New Web applications require engaging user-friendly interfaces-and the cooler, the better. With Flex 3, Web developers at any skill level can create high-quality, effective, and interactive Rich Internet Applications (RIAs) quickly and easily. Flex removes the complexity barrier from RIA development by offering sophisticated tools and a...
Ubuntu Server Administration (Network Professional's Library)
Ubuntu Server Administration (Network Professional's Library)
The market for Linux servers has been growing steadily over the past decade. Based on server revenues, in the year 2000, the market for Linux servers was around US $1.5 billion. In 2007, International Data Corporation (IDC) confirmed that the market for Linux servers was US $21 billion.

IDC projects that the Linux server market will grow
...
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business provides in plain English a no–nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls,...
Mac OS X Leopard Portable Genius
Mac OS X Leopard Portable Genius
The Genius is in.

You don't have to be a genius to use Mac OS X Leopard. But if you want to get the very most out of it, put this savvy Portable Genius guide to work and start ramping up the pace. Want to discover Leopard's applications and utilities? Automate repetitive tasks? Use UNIX commands? Install Windows? You'll find cool and useful...

Next Generation SSH2 Implementation: Securing Data in Motion
Next Generation SSH2 Implementation: Securing Data in Motion
The most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book
...
Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Windows® Small Business Server 2008 Administrator's Companion (Pro - Administrator's Companion)
Windows® Small Business Server 2008 Administrator's Companion (Pro - Administrator's Companion)
This comprehensive administrator s reference delivers the details you need to successfully deploy, manage, and support Windows Small Business Server 2008. The authors, experts in Microsoft operating systems and server technologies, provide easy-to-follow procedures, practical workarounds, and key troubleshooting tactics. Delve into system features...
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy