Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fundamentals of Linux: Explore the essentials of the Linux command line
Fundamentals of Linux: Explore the essentials of the Linux command line

Develop a solid understanding of the important command-line tools and utilities in Linux

Key Features

  • Delve into the fundamentals of Linux
  • Explore and work with virtualization, command lines, and Bash shell scripts
  • Use special file permission flags such as...
Web Accessibility for People with Disabilities (R & D Developer Series)
Web Accessibility for People with Disabilities (R & D Developer Series)
Key Benefits Comply with all legal mandates and standards Master HTML enhancements for accessibility Employ the best accessibility tools Make your Web site accessible to everyone! This definitive resource provides Internet and Web administrators and devel

Make your Web site accessible to everyone!
...
Microsoft Windows XP Power Toolkit
Microsoft Windows XP Power Toolkit

Anyone who uses their computer on a regular basis comes to rely on favorite features and utilities—software tools—to get their job done. Every new version of Microsoft Windows has introduced new and more powerful special features and utilities. When viewed together, these aspects of Windows XP, whether part of its user interface...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks

The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task.
...

Oracle RMAN 11g Backup and Recovery (Osborne ORACLE Press Series)
Oracle RMAN 11g Backup and Recovery (Osborne ORACLE Press Series)

Master Oracle Recovery Master

Protect your databases from hardware, software, and operator failures using the detailed information in this Oracle Press guide. Oracle RMAN 11g Backup and Recovery explains how to configure databases, generate accurate archives, and carry out system restores. Work from the command line or...

Mastering Concurrency Programming with Java 8
Mastering Concurrency Programming with Java 8

Master the principles and techniques of multithreaded programming with the Java 8 Concurrency API

About This Book

  • Implement concurrent applications using the Java 8 Concurrency API and its new components
  • Improve the performance of your applications or process more data at the same time,...
Linux in a Nutshell, Fourth Edition
Linux in a Nutshell, Fourth Edition
Comprehensive but concise, Linux in a Nutshell is an essential desktop reference for the commands that users of Linux utilize every day. It covers all substantial user, programming, administration, and networking commands for the most common Linux distributions. It's several quick references rolled into one:...
Adobe Acrobat 5 PDF Bible
Adobe Acrobat 5 PDF Bible
With 1000f what you need to know about Adobe Acrobat and PDF, this critically acclaimed, authoritative reference has now been completely updated and enhanced to cover the powerful new release of Adobe Acrobat.

If Acrobat 5 can do it, you can do it too...Whether you're a graphic artist or prepress specialist looking for the most efficient
...
Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

UNIX for Programmers and Users (3rd Edition)
UNIX for Programmers and Users (3rd Edition)

For an introductory course on UNIX.

UNIX for Programmers and Users, Third Edition follows in the tradition of previous editions to provide students with complete, up-to-date coverage of UNIX. In this new edition they will find information on basic concepts,...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy