Home | Amazing | Today | Tags | Publishers | Years | Search 
Securing Windows 2000 Step by Step
Securing Windows 2000 Step by Step
This guide is the joint product of a community of Windows security managers and experts, who have voluntarily shared their experiences in this field so that others may benefit. The guide can be used to substantially improve the security of Windows 2000 computers and networks.

Just as Windows 2000 is the next evolution of Windows NT 4.0,
...
Dissecting the Holocaust: The Growing Critique of Truth and Memory
Dissecting the Holocaust: The Growing Critique of Truth and Memory

Historical revisionism is the great intellectual adventure of the end of the 20th century.

Despite its size, the present handbook offers only a glimpse of that adventure; and so it seems necessary here first to specify the precise historical problem upon which the Revisionists have concentrated their research, then how revisionism...

Hoax of the Twentieth Century
Hoax of the Twentieth Century

Professor A. R. Butz was the first (and so far the only) writer to treat the entire Holocaust complex from the Revisionist perspective, in a precise scientific manner. This book exhibits the overwhelming force of historical and logical arguments which Revisionism had accumulated by the middle of the 70s. This new edition comes with several...

The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
A Bibliography of the Personal Computer: The Books and Periodical Articles
A Bibliography of the Personal Computer: The Books and Periodical Articles
This bibliography has been abstracted from my book entitled “A History of the Personal Computer: The People and the Technology” (ISBN 0-9689108-0-7). It has been updated to add additional books and new books released between 2001 and 2005. It has also been rearranged to facilitate its use as a separate publication. The content of this...
Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
Securing & Optimizing Linux: A Hands on Guide for Linux Professionals
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and...
Practical LSD Manufacture 3rd edition
Practical LSD Manufacture 3rd edition

This book covers in great detail virtually all known methods for making LSD. Emphasis is placed on using botanical sources of lysergic acid such as ergot and morning glory seeds, but extraction of ergotamine migraine pills is also covered. Every recipe is presented along with references back to the original works in the scientific liturature....

Itanium Architecture for Software Developers
Itanium Architecture for Software Developers
"Reading the Itanium Architecture for Software Developers book saved us days, maybe weeks on project development." -- Dong Wei, System Architect for Servers, Hewlett-Packard

Product Description
This unique description of the Intel® Itanium™ application architecture helps
...
Workflow Handbook 2003
Workflow Handbook 2003
Published in association with the Workflow Management Coalition (WfMC), the Workflow Handbook 2002 comprises four sections in over 400 information-packed pages:

SECTION 1: The World of Workflow covers a wide spectrum of viewpoints and discussions by experts in their respective fields. Papers range from an Introduction to Workflow through to a...

Vatican assassins: "wounded in the house of my friends"
Vatican assassins: "wounded in the house of my friends"
Eric Jon Phelps gives the past and present diabolical history of the Society of Jesus. Its Second Thirty Years' War (1914-1945), including the Jewish, Lutheran, Orthodox and Buddhist Holocausts, was vengeance for the Order's expulsion from Europe and Asia during the Nineteenth Century.

Its Cold War was the coninuation of the killing of
...
Mathematics for Business, Science, and Technology
Mathematics for Business, Science, and Technology
This text is targeted at high school seniors who plan to enter business, science, and technology related fields, and working professionals seeking to enhance their knowledge on various math topics including probability and optimization methods. This book begins with the basic mathematical operations and ends with advanced and yet practical...
Result Page: Previous 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy