Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

Switching to the Mac: The Missing Manual, Tiger Edition
Switching to the Mac: The Missing Manual, Tiger Edition

It's little wonder that longtime Windows users are migrating in droves to the new Mac. They're fed up with the virus-prone Windows way of life, and they're lured by Apple's well-deserved reputation for producing great all-around computers that are reliable, user-friendly, well designed, and now--with the $500 Mac mini--extremely...

Principles of Applied Reservoir Simulation
Principles of Applied Reservoir Simulation
Principles of Applied Reservoir Simulation and its accompanying CD offer users a fully functioning reservoir simulator. Together, the book and CD provide a hands-on introduction to the process of reservoir modeling and show how to apply reservoir simulation technology and principles.

The book begins with a reservoir engineering primer
...
Inside Direct3D (Dv-Mps Inside)
Inside Direct3D (Dv-Mps Inside)

With the introduction of Microsoft Windows 95, game developers had the opportunity to develop Windows-based games that were far more powerful than was possible with earlier versions of Windows. Even with this capability, however, accessing the multimedia hardware consistently and efficiently was no easy task—that is, until Microsoft...

Building a Web 2.0 Portal with ASP.NET 3.5
Building a Web 2.0 Portal with ASP.NET 3.5
If you think you're well versed in ASP.NET, think again. This exceptional guide gives you a master class in site building with ASP.NET 3.5 and other cutting-edge Microsoft technologies. You learn how to develop rock-solid web portal applications that can withstand millions of hits every day while surviving scalability and security pressures -- not...
Bounce, Tumble, and Splash!: Simulating the Physical World with Blender 3D
Bounce, Tumble, and Splash!: Simulating the Physical World with Blender 3D
Learn all about Blender, the premier open-source 3D software, in Bounce, Tumble, and Splash!: Simulating the Physical World with Blender 3D. You will find step-by-step instructions for using Blender’s complex features and full-color visual examples with detailed descriptions of the processes. If you’re an advanced...
Practical Eclipse Rich Client Platform Projects (Practical Projects)
Practical Eclipse Rich Client Platform Projects (Practical Projects)
Eclipse and the Rich Client Platform (RCP) together form a leading development platform. It provides a lightweight software component framework based on plug–ins. In addition to allowing Eclipse to be extended using other programming languages, it provides the key to the seamless integration of tools with Eclipse. The RPC gives Eclipse its...
Designing for Windows 8: Fundamentals of Great Design in Windows Store Apps
Designing for Windows 8: Fundamentals of Great Design in Windows Store Apps

Designing for Windows 8 is a fast-paced, 150-page primer on the key design concepts you need to create successful Windows 8 apps. This book will help you design a user interface that is both delightful and effective, feels ‘right’ to your users, and encapsulates a great Windows 8 experience.

In this book,
...

Monitoring and Managing Microsoft Exchange 2000 Server (HP Technologies)
Monitoring and Managing Microsoft Exchange 2000 Server (HP Technologies)

Monitoring and Managing Microsoft Exchange 2000 Server focuses on what to do after Exchange has been deployed—how to design and implement the support infrastructure, how to monitor and manage messaging traffic, and how to avoid disaster through proactive planning and management. ...

Writing Secure Code, Second Edition
Writing Secure Code, Second Edition

If you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web-based or Win32-based, you need this book. Finally, if you are currently learning or building Microsoft .NET Framework–based applications, you need this book. In short, if you are involved in building...

Using Samba, Second Edition
Using Samba, Second Edition
Using Samba, Second Edition is a comprehensive guide to Samba administration. This new edition covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores...
Windows Server 2003 Pocket Administrator
Windows Server 2003 Pocket Administrator
Twenty years ago, when most computers were mainframes
or minicomputers, operators and administrators had
scheduled, specific tasks they needed to perform on an
ongoing basis. Each time a task was performed, they had
to make note of the time and write their initials in a
logbook to demonstrate when the task was performed...
unlimited object storage image
Result Page: 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy