Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

Art of RAW Conversion: How to Produce Art-Quality Photos with Adobe Photoshop CS2 and Leading RAW Converters
Art of RAW Conversion: How to Produce Art-Quality Photos with Adobe Photoshop CS2 and Leading RAW Converters
The RAW file format used by digital cameras is essentially the raw data that a camera captures when it takes a photo. RAW files allow the digital photographer to edit and manipulate their photos with less data loss than in other file formats (such as JPEG). There are many RAW conversion tools, and it's often a good idea to use more than one to get...
Berkeley DB
Berkeley DB

Small, special-purpose computing devices and high-end core Internet servers need fast, reliable database management. Berkeley DB is an embedded database that provides high-performance, scalable, transaction-protected and recoverable data management services to applications. Extremely portable, this library runs under almost all...

Introducing UNIX and Linux (Grassroots)
Introducing UNIX and Linux (Grassroots)
UNIX is an operating system which has seen substantial growth in its popularity over the last few years and is used by many universities and colleges, as well as in industry. Linux is a UNIX-like operating system for PCs which is freely available and has become a serious alternative to proprietary systems such as Windows. This book is a...
Introduction to GUI with Swing
Introduction to GUI with Swing
Modern operating systems such as Microsoft’s Windows, Apple’s MacOS, and the different Unix-based versions such as Linux or Solaris use a graphical interface to communicate with the user. The communication consists of information displayed by programs and actions and commands issued by the user. This book is an introduction to graphic...
PalmPilot: The Ultimate Guide: Mastering Palm Organizers from Pilot 1000 to Palm VII
PalmPilot: The Ultimate Guide: Mastering Palm Organizers from Pilot 1000 to Palm VII

3Com's PalmPilot is the world's bestselling hand-held computer platform. In three years, its 16 models from 5 different manufacturers have captured 80 percent of the palmtop market. About the size of a playing card, Palm devices are lightweight (under 6 ounces), offering two-month battery life, handwriting recognition,...

Reproducible Research with R and R Studio (Chapman & Hall/CRC The R Series)
Reproducible Research with R and R Studio (Chapman & Hall/CRC The R Series)

Bringing together computational research tools in one accessible source, Reproducible Research with R and RStudio guides you in creating dynamic and highly reproducible research. Suitable for researchers in any quantitative empirical discipline, it presents practical tools for data collection, data analysis, and the...

Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Fully updated for today's key threats, tools, and solutions, this book shows you how hackers...
Microsoft Windows 2000 Server Administrator's Companion, Second Edition
Microsoft Windows 2000 Server Administrator's Companion, Second Edition

When the first edition of this book was published in 2000 coinciding with the release of the Microsoft Windows 2000 family of operating systems, we were extremely gratified by the positive reception from network administrators and others interested in Windows 2000 Server. We're very proud of the book and think it's a worthwhile resource for...

Building a Cisco Network for WIndows 2000
Building a Cisco Network for WIndows 2000
The release of Windows 2000 Server represents a major advance in the integration of Microsoft's and Cisco's network technologies. Windows 2000 provides an LDAP-compliant directory service called Active Directory. It is accessible over any TCP/IP based internetwork, including the Internet. As such, the Active Directory is the foundation of this...
Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy