Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Internet Firewalls (2nd Edition)
Building Internet Firewalls (2nd Edition)
In the vast and varied universe of computer books, only a few stand out as the best in their subject areas. Building Internet Firewalls is one of those. It's deep, yet carefully focused, so that almost anything you might want to know about firewall strategies for protecting networks is here. In addition, there's lots of information on...
The SPIN Model Checker: Primer and Reference Manual
The SPIN Model Checker: Primer and Reference Manual
SPIN is the world's most popular, and arguably one of the world's most powerful, tools for detecting software defects
in concurrent system designs. Literally thousands of people have used SPIN since it was first introduced almost fifteen
years ago. The tool has been applied to everything from the verification of complex call processing
...
eDirectory Field Guide
eDirectory Field Guide

eDirectory Field Guide is a handy reference for configuring, troubleshooting, and optimizing Novells eDirectory on NetWare, Linux, Unix, and Windows. Along with Sun ONE Directory Server and Microsoft Active Directory, Novells eDirectory is a leader in directory server software, the specialized database that enterprises employ to store...

Professional Windows PowerShell (Programmer to Programmer)
Professional Windows PowerShell (Programmer to Programmer)
Professional Windows® PowerShell

Forget everything you know about the Windows command line because you're about to enter a whole new ballgame. Windows PowerShell provides a new environment for interactive exploration and administration of Windows machines that's different from and more consistent than what you've previously used on Windows...

Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Pro WCF: Practical Microsoft SOA Implementation
Pro WCF: Practical Microsoft SOA Implementation
Part of Microsofts radical new WinFX API is the Indigo foundation, more formally known as the Windows Communication Foundation, or WCF. Pro WCF: Practical Microsoft SOA Implementation is a complete guide to WCF from the SOA architecture perspective and shows you why WCF is important to web service development and architecture.

The book...

CompTIA A+ Complete Study Guide
CompTIA A+ Complete Study Guide
All-in-one guide prepares you for CompTIA's new A+ Certification

Candidates aiming for CompTIA's revised, two-exam A+ Certified Track will find everything they need in this value-packed book. Prepare for the required exam, CompTIA A+ Essentials (220-601), as well as your choice of one of three additional exams focusing on...

Beginning Excel Services (Programmer to Programmer)
Beginning Excel Services (Programmer to Programmer)
Given the prominent role Excel plays in today's companies, the need for users to better manage, distribute, and incorporate spreadsheets in larger applications is greater than ever. Written by Microsoft's lead developers of Excel Services, this book shares their insights into the benefits and usage of Excel's new server technology so that you can...
Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
You generally can't pick up knowledge of Cisco products casually, the way you can learn about Microsoft Windows, Unix, and other products that are more generally accessible. For this reason, Cisco: A Beginner's Guide performs a valuable service. It introduces internetworking novices to the language and fact base that underlie routers,...
Essential SourceSafe
Essential SourceSafe
This training aid and reference manual assists casual users, software developers, and SourceSafe administrators in installing, configuring, and maintaining SourceSafe in a variety of development environments. A broad spectrum of topics are covered, from the basics of installation and maintenance, to more advanced features such as reporting, to...
High Availability and Disaster Recovery: Concepts, Design, Implementation
High Availability and Disaster Recovery: Concepts, Design, Implementation

Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. High availability and disaster...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Result Page: 70 69 68 67 66 65 64 63 62 61 60 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy