Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Databases with PostgreSQL: From Novice to Professional, Second Edition
Beginning Databases with PostgreSQL: From Novice to Professional, Second Edition
Welcome to Beginning Databases with PostgreSQL.
Early in our careers, we came to recognize the qualities of open-source software. Not only
is it often completely free to use, but it can also be of extremely high quality. If you have a problem,
you can examine the source code to see how it works. If you find a bug, you can fix it
...
Microsoft Encyclopedia of Networking, Second Edition
Microsoft Encyclopedia of Networking, Second Edition
Whether you're a system administrator, MCSA/MCSE certification candidate, or a CIO-here's definitive reference on the latest networking technologies and terminology. The superbly illustrated MICROSOFT ENCYCLOPEDIA OF NETWORKING, Second Edition, features thousands of entries-including many new entries and critical updates and revisions to the...
SSH, The Secure Shell: The Definitive Guide
SSH, The Secure Shell: The Definitive Guide
Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers,...
Red Hat Linux 7.2 Bible Unlimited Edition (With CD-ROM)
Red Hat Linux 7.2 Bible Unlimited Edition (With CD-ROM)
Linux was a phenomenon waiting to happen. The computer industry suffered from a rift. In the 1980s and
1990s, people had to choose between inexpensive, market−driven PC operating systems from Microsoft and
expensive, technology−driven operating systems such as UNIX. Free software was being created all over the
world, but
...
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Mac OS X Power Hound
Mac OS X Power Hound
You're about to gain insight into Mac OS X, an elegant operating system with Formula One power under the hood. This book is like your pit crew, helping you find easier, faster, and better ways of using the Finder, the Dock, the assortment of programs that come with Mac OS X, and a bunch of programs that don't. And if you want to become your own...
High Performance MySQL
High Performance MySQL
In High Performance MySQL you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life...
Mac OS X for Java Geeks
Mac OS X for Java Geeks
Mac OS X for Java Geeks delivers a complete and detailed look at the Mac OS X platform, geared specifically at Java developers. Programmers using the 10.2 (Jaguar) release of Mac OS X, and the new JDK 1.4, have unprecedented new functionality available to them. Whether you are a Java newbie, working your way through...
Programming C#, Third Edition
Programming C#, Third Edition
The new edition of Programming C# focuses on the features and programming patterns that are new to the C# language and fundamental to the programming of web services and web applications on the .NET platform. Newly updated for version 1.1 of the .NET Framework and Visual Studio .NET 2003, the book features new tips & tricks plus answers to...
Advanced DBA Certification Guide and Reference for DB2 UDB v8 for Linux, Unix and Windows
Advanced DBA Certification Guide and Reference for DB2 UDB v8 for Linux, Unix and Windows
Whether you're a long-time DB2 UDB professional or an experienced DBA who's migrated from another database platform, there's one sure way to demonstrate the highest level of skills in DB2 Universal Database administration: pass the challenging IBM DB2 Universal Database Advanced Database Administration Exam 704.

Now, there's a definitive guide...

Linux Phrasebook
Linux Phrasebook

Linux Phrasebook

is sure to become the pocket guide that you keep within reach at all times. This concise, handy reference can be used "in the street," just like a language phrasebook. Skipping the usual tutorial on Linux, the ...

Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy